Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-43945 (GCVE-0-2022-43945)
Vulnerability from cvelistv5
- CWE-131 - Incorrect Calculation of Buffer Size
| Vendor | Product | Version | ||
|---|---|---|---|---|
| linux | linux_kernel |
Version: < 6.0.2 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T13:40:06.873Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
},
{
"tags": [
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-43945",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-01T19:08:01.476613Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-01T19:08:43.378Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "linux_kernel",
"vendor": "linux",
"versions": [
{
"status": "affected",
"version": "\u003c 6.0.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-131",
"description": "CWE-131: Incorrect Calculation of Buffer Size",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-08T00:00:00.000Z",
"orgId": "8cad7728-009c-4a3d-a95e-ca62e6ff8a0b",
"shortName": "SNPS"
},
"references": [
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
},
{
"url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
},
{
"url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8cad7728-009c-4a3d-a95e-ca62e6ff8a0b",
"assignerShortName": "SNPS",
"cveId": "CVE-2022-43945",
"datePublished": "2022-11-04T00:00:00.000Z",
"dateReserved": "2022-10-26T00:00:00.000Z",
"dateUpdated": "2025-05-01T19:08:43.378Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-43945\",\"sourceIdentifier\":\"disclosure@synopsys.com\",\"published\":\"2022-11-04T19:15:11.180\",\"lastModified\":\"2025-05-01T19:15:55.283\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n NFSD del kernel de Linux anterior a las versiones 5.19.17 y 6.0.2 es vulnerable al desbordamiento del b\u00fafer. NFSD rastrea el n\u00famero de p\u00e1ginas retenidas por cada subproceso NFSD combinando los b\u00faferes de recepci\u00f3n y env\u00edo de una llamada a procedimiento remoto (RPC) en una \u00fanica matriz de p\u00e1ginas. Un cliente puede forzar la reducci\u00f3n del b\u00fafer de env\u00edo enviando un mensaje RPC a trav\u00e9s de TCP con datos basura agregados al final del mensaje. El mensaje RPC con datos basura todav\u00eda est\u00e1 formado correctamente seg\u00fan la especificaci\u00f3n y se pasa a los controladores. El c\u00f3digo vulnerable en NFSD no espera la solicitud de gran tama\u00f1o y escribe m\u00e1s all\u00e1 del espacio de b\u00fafer asignado. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H \"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"disclosure@synopsys.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-131\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.19.17\",\"matchCriteriaId\":\"E287B74B-5F32-4BA9-801E-4C57E101C790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"6.0.2\",\"matchCriteriaId\":\"B0624AD1-5A88-463E-96D1-F938FCBA6EEA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html\",\"source\":\"disclosure@synopsys.com\"},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8\",\"source\":\"disclosure@synopsys.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221215-0006/\",\"source\":\"disclosure@synopsys.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221215-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20221215-0006/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:40:06.873Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-43945\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-01T19:08:01.476613Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-01T19:08:21.337Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"linux\", \"product\": \"linux_kernel\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 6.0.2\"}]}], \"references\": [{\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20221215-0006/\"}, {\"url\": \"http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-131\", \"description\": \"CWE-131: Incorrect Calculation of Buffer Size\"}]}], \"providerMetadata\": {\"orgId\": \"8cad7728-009c-4a3d-a95e-ca62e6ff8a0b\", \"shortName\": \"SNPS\", \"dateUpdated\": \"2023-03-08T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-43945\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-01T19:08:43.378Z\", \"dateReserved\": \"2022-10-26T00:00:00.000Z\", \"assignerOrgId\": \"8cad7728-009c-4a3d-a95e-ca62e6ff8a0b\", \"datePublished\": \"2022-11-04T00:00:00.000Z\", \"assignerShortName\": \"SNPS\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0258
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une élévation de privilèges, un déni de service à distance, une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS) et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | IBM Spectrum Protect Client versions 8.1.x antérieures à 8.1.17.2 | ||
| IBM | WebSphere | IBM WebSphere Remote Server version 9.0 déployée avec une version de IBM WebSphere Application Server antérieure à 9.0.5.14 incluant le correctif PH52925 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus versions 10.1.x antérieures à 10.1.14 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Spectrum Protect Client versions 8.1.x ant\u00e9rieures \u00e0 8.1.17.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Remote Server version 9.0 d\u00e9ploy\u00e9e avec une version de IBM WebSphere Application Server ant\u00e9rieure \u00e0 9.0.5.14 incluant le correctif PH52925",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.14",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-26283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26283"
},
{
"name": "CVE-2022-32190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2019-20444",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20444"
},
{
"name": "CVE-2022-2601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2601"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2022-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2421"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-28893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28893"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-27863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27863"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2022-2047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2047"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"initial_release_date": "2023-03-24T00:00:00",
"last_revision_date": "2023-03-24T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0258",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eIBM\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nun contournement de la politique de s\u00e9curit\u00e9, une \u00e9l\u00e9vation de\nprivil\u00e8ges, un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une injection de code indirecte \u00e0 distance\n(XSS) et une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6963786 du 23 mars 2023",
"url": "https://www.ibm.com/support/pages/node/6963786"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6965816 du 23 mars 2023",
"url": "https://www.ibm.com/support/pages/node/6965816"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6965812 du 23 mars 2023",
"url": "https://www.ibm.com/support/pages/node/6965812"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6965822 du 23 mars 2023",
"url": "https://www.ibm.com/support/pages/node/6965822"
}
]
}
CERTFR-2024-AVI-0613
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian bullseye versions ant\u00e9rieures \u00e0 5.10.221-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian bookworm versions ant\u00e9rieures \u00e0 6.1.99-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-38662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38662"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-41004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
},
{
"name": "CVE-2024-36973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36973"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40935"
},
{
"name": "CVE-2024-26629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26629"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2023-52760",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52760"
},
{
"name": "CVE-2024-39474",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39474"
},
{
"name": "CVE-2024-41000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41000"
},
{
"name": "CVE-2024-36974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
},
{
"name": "CVE-2024-39496",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39496"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38548"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-39509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
},
{
"name": "CVE-2024-39484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39484"
},
{
"name": "CVE-2024-40971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40971"
},
{
"name": "CVE-2024-39505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-40932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-41006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40920"
},
{
"name": "CVE-2024-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38590"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-39480",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39480"
},
{
"name": "CVE-2024-33847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33847"
},
{
"name": "CVE-2024-39488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39488"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40899"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-40976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
},
{
"name": "CVE-2024-39468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39468"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-40980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40980"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38613"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-34027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34027"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38612"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2024-39467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39467"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40963"
},
{
"name": "CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"name": "CVE-2024-40947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
},
{
"name": "CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"name": "CVE-2024-39507",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39507"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-40905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40905"
},
{
"name": "CVE-2024-40906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40906"
},
{
"name": "CVE-2024-39475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39475"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
},
{
"name": "CVE-2024-40970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40970"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39371"
},
{
"name": "CVE-2024-39489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39489"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2024-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38547"
},
{
"name": "CVE-2024-40938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40938"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-35247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35247"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40910"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
},
{
"name": "CVE-2024-40943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
},
{
"name": "CVE-2024-36489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-39476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
},
{
"name": "CVE-2024-40957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40957"
},
{
"name": "CVE-2024-40939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40939"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-40987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40945"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2024-40967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40967"
},
{
"name": "CVE-2024-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38637"
},
{
"name": "CVE-2024-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38635"
},
{
"name": "CVE-2024-40921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40921"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-40990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-40968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40968"
},
{
"name": "CVE-2024-38589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38589"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-40996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40996"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-40981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-40915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40915"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-40993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40993"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-36288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36288"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-39292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39292"
},
{
"name": "CVE-2024-38607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38607"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-41002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41002"
},
{
"name": "CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-40942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
},
{
"name": "CVE-2024-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38605"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-39510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39510"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-40914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40914"
},
{
"name": "CVE-2024-40953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40953"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"initial_release_date": "2024-07-19T00:00:00",
"last_revision_date": "2024-07-19T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0613",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-5731-1",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00142.html"
},
{
"published_at": "2024-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-5730-1",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00141.html"
}
]
}
CERTFR-2022-AVI-1070
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
}
],
"initial_release_date": "2022-12-02T00:00:00",
"last_revision_date": "2022-12-02T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 01 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5755-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 01 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5757-2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 01 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5758-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 01 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5756-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 01 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5757-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 01 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5754-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 30 novembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5752-1"
}
],
"reference": "CERTFR-2022-AVI-1070",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5755-1 du 01 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5756-1 du 01 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5752-1 du 30 novembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5754-1 du 01 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5757-1 du 01 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5757-2 du 01 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5758-1 du 01 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0195
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans RedHat. Elles permettent à un attaquant de provoquer un exécution de code arbitriare, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
}
],
"initial_release_date": "2023-03-03T00:00:00",
"last_revision_date": "2023-03-03T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0195",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eRedHat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un ex\u00e9cution de code arbitriare, un d\u00e9ni de service \u00e0 distance\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:0944 du 28 f\u00e9vrier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0944"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:0979 du 28 f\u00e9vrier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0979"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:0832 du 21 f\u00e9vrier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
]
}
CERTFR-2025-AVI-0921
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | Public Cloud Module | Public Cloud Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 LTS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | Public Cloud Module | Public Cloud Module 15-SP6 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 LTS | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 LTS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3 LTS",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP6",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3 LTS",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP6",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3 LTS",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-53443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53443"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2023-53453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53453"
},
{
"name": "CVE-2025-38380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38380"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2023-53473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53473"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2022-50367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50367"
},
{
"name": "CVE-2025-39808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39808"
},
{
"name": "CVE-2023-53475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53475"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2023-53312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53312"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2023-53311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53311"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2023-53393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53393"
},
{
"name": "CVE-2023-53480",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53480"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2023-53303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53303"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2022-50469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50469"
},
{
"name": "CVE-2022-50429",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50429"
},
{
"name": "CVE-2023-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53150"
},
{
"name": "CVE-2023-53321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53321"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2023-53317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53317"
},
{
"name": "CVE-2023-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53176"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2022-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50298"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-53349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53349"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2023-53405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53405"
},
{
"name": "CVE-2023-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53185"
},
{
"name": "CVE-2023-53359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53359"
},
{
"name": "CVE-2022-50466",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50466"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2023-53441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53441"
},
{
"name": "CVE-2023-53199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53199"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2023-53245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53245"
},
{
"name": "CVE-2023-53415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53415"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2022-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50255"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2023-53461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53461"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2023-53531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53531"
},
{
"name": "CVE-2025-39828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39828"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2023-53449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53449"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2023-53451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53451"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2022-50368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50368"
},
{
"name": "CVE-2025-38216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38216"
},
{
"name": "CVE-2022-50349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50349"
},
{
"name": "CVE-2023-53394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53394"
},
{
"name": "CVE-2023-53494",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53494"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-39811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39811"
},
{
"name": "CVE-2022-50358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50358"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50386"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38563"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2023-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53222"
},
{
"name": "CVE-2023-53264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53264"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2023-53519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53519"
},
{
"name": "CVE-2022-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50294"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2023-53472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53472"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2023-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53217"
},
{
"name": "CVE-2023-53390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53390"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-39920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39920"
},
{
"name": "CVE-2022-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50379"
},
{
"name": "CVE-2022-50257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50257"
},
{
"name": "CVE-2023-53354",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53354"
},
{
"name": "CVE-2023-53504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53504"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2022-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50301"
},
{
"name": "CVE-2022-50432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50432"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2023-52923",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52923"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2023-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53189"
},
{
"name": "CVE-2023-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53427"
},
{
"name": "CVE-2023-53498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53498"
},
{
"name": "CVE-2023-4130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4130"
},
{
"name": "CVE-2023-53242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53242"
},
{
"name": "CVE-2022-50395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50395"
},
{
"name": "CVE-2023-53309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53309"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2022-50456",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50456"
},
{
"name": "CVE-2025-39751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39751"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2023-53425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53425"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2022-50321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50321"
},
{
"name": "CVE-2023-53235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53235"
},
{
"name": "CVE-2025-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38565"
},
{
"name": "CVE-2022-50439",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50439"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2023-53304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53304"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2023-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53216"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2023-53339",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53339"
},
{
"name": "CVE-2023-53239",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53239"
},
{
"name": "CVE-2023-53280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53280"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53179"
},
{
"name": "CVE-2022-50434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50434"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2022-50353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50353"
},
{
"name": "CVE-2023-53493",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53493"
},
{
"name": "CVE-2022-50404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50404"
},
{
"name": "CVE-2023-53492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53492"
},
{
"name": "CVE-2023-31248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31248"
},
{
"name": "CVE-2023-53388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53388"
},
{
"name": "CVE-2025-39853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39853"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2022-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50264"
},
{
"name": "CVE-2025-39871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39871"
},
{
"name": "CVE-2025-39857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39857"
},
{
"name": "CVE-2022-50320",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50320"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2022-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50286"
},
{
"name": "CVE-2022-50449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50449"
},
{
"name": "CVE-2023-53431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53431"
},
{
"name": "CVE-2022-50324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50324"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2023-53462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53462"
},
{
"name": "CVE-2025-39865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39865"
},
{
"name": "CVE-2025-39816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39816"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2022-50251",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50251"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2023-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53148"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2022-50373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50373"
},
{
"name": "CVE-2023-53505",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53505"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2022-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50269"
},
{
"name": "CVE-2023-53275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53275"
},
{
"name": "CVE-2022-50437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50437"
},
{
"name": "CVE-2024-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49974"
},
{
"name": "CVE-2022-50391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50391"
},
{
"name": "CVE-2023-53476",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53476"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2023-53468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53468"
},
{
"name": "CVE-2022-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50261"
},
{
"name": "CVE-2022-50351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50351"
},
{
"name": "CVE-2022-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50272"
},
{
"name": "CVE-2022-50331",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50331"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-39823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39823"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2023-53183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53183"
},
{
"name": "CVE-2023-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53195"
},
{
"name": "CVE-2025-39864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39864"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2022-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50268"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2023-53319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53319"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-39824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39824"
},
{
"name": "CVE-2023-53515",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53515"
},
{
"name": "CVE-2023-53420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53420"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2023-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53241"
},
{
"name": "CVE-2023-53305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53305"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2023-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53177"
},
{
"name": "CVE-2023-53381",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53381"
},
{
"name": "CVE-2023-53369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53369"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-50419",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50419"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2023-53328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53328"
},
{
"name": "CVE-2022-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50289"
},
{
"name": "CVE-2022-50329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50329"
},
{
"name": "CVE-2025-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39842"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2023-53165",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53165"
},
{
"name": "CVE-2023-53270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53270"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-39849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39849"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2022-50409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50409"
},
{
"name": "CVE-2022-50453",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50453"
},
{
"name": "CVE-2023-53512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53512"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2023-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53238"
},
{
"name": "CVE-2025-39861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39861"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38597"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2022-50333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50333"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2023-53360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53360"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2023-53336",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53336"
},
{
"name": "CVE-2023-53426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53426"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2022-50330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50330"
},
{
"name": "CVE-2023-53223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53223"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2022-50309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50309"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2023-53448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53448"
},
{
"name": "CVE-2023-53374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53374"
},
{
"name": "CVE-2023-53384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53384"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2022-50297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50297"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2022-50435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50435"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2022-50411",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50411"
},
{
"name": "CVE-2022-50465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50465"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2022-50346",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50346"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2023-53458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53458"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2022-50417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50417"
},
{
"name": "CVE-2023-53326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53326"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-53457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53457"
},
{
"name": "CVE-2025-39845",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39845"
},
{
"name": "CVE-2023-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53230"
},
{
"name": "CVE-2023-53397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53397"
},
{
"name": "CVE-2023-53171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53171"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2022-50370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50370"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2023-53516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53516"
},
{
"name": "CVE-2023-53474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53474"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2022-50355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50355"
},
{
"name": "CVE-2023-53400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53400"
},
{
"name": "CVE-2023-53287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53287"
},
{
"name": "CVE-2025-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38616"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2022-50454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50454"
},
{
"name": "CVE-2023-53350",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53350"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2023-53454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53454"
},
{
"name": "CVE-2023-53471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53471"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38541"
},
{
"name": "CVE-2023-53416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53416"
},
{
"name": "CVE-2022-50344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50344"
},
{
"name": "CVE-2023-53322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53322"
},
{
"name": "CVE-2023-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53220"
},
{
"name": "CVE-2023-53272",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53272"
},
{
"name": "CVE-2022-50388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50388"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2023-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53210"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2023-53259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53259"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2022-50318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50318"
},
{
"name": "CVE-2023-53413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53413"
},
{
"name": "CVE-2022-50389",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50389"
},
{
"name": "CVE-2023-53528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53528"
},
{
"name": "CVE-2023-53524",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53524"
},
{
"name": "CVE-2023-53496",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53496"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2023-53257",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53257"
},
{
"name": "CVE-2023-53523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53523"
},
{
"name": "CVE-2022-50359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50359"
},
{
"name": "CVE-2023-53357",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53357"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-53335",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53335"
},
{
"name": "CVE-2023-53488",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53488"
},
{
"name": "CVE-2023-53464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53464"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2023-53334",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53334"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2023-53356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53356"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2023-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53151"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2022-50342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50342"
},
{
"name": "CVE-2023-53288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53288"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2023-53406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53406"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2023-53352",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53352"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2023-53291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53291"
},
{
"name": "CVE-2022-50408",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50408"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2022-50399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50399"
},
{
"name": "CVE-2022-50372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50372"
},
{
"name": "CVE-2025-21971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-39834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39834"
},
{
"name": "CVE-2022-50431",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50431"
},
{
"name": "CVE-2023-53263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53263"
},
{
"name": "CVE-2023-53527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53527"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2023-53404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53404"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-38678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38678"
},
{
"name": "CVE-2023-53344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53344"
},
{
"name": "CVE-2023-53324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53324"
},
{
"name": "CVE-2023-53465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53465"
},
{
"name": "CVE-2022-50468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50468"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2023-53368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53368"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2022-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50282"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2023-53276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53276"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38628"
},
{
"name": "CVE-2023-53518",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53518"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2025-39860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39860"
},
{
"name": "CVE-2022-50347",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50347"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2023-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53506"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2022-50443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50443"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2023-53409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53409"
},
{
"name": "CVE-2023-53396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53396"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-39839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39839"
},
{
"name": "CVE-2023-53282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53282"
},
{
"name": "CVE-2025-39848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39848"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2023-53435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53435"
},
{
"name": "CVE-2022-50328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50328"
},
{
"name": "CVE-2023-53391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53391"
},
{
"name": "CVE-2023-53487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53487"
},
{
"name": "CVE-2022-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50267"
},
{
"name": "CVE-2023-53437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53437"
},
{
"name": "CVE-2022-50317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50317"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2023-53250",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53250"
},
{
"name": "CVE-2023-53338",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53338"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50235"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2023-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53206"
},
{
"name": "CVE-2022-50364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50364"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2022-50276",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50276"
},
{
"name": "CVE-2023-53432",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53432"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2023-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3867"
},
{
"name": "CVE-2022-50401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50401"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2022-50376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50376"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2023-53422",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53422"
},
{
"name": "CVE-2023-53244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53244"
},
{
"name": "CVE-2022-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50275"
},
{
"name": "CVE-2023-53373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53373"
},
{
"name": "CVE-2023-53375",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53375"
},
{
"name": "CVE-2025-39882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39882"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2022-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50308"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2023-53530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53530"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2023-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53197"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2023-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53229"
},
{
"name": "CVE-2025-39806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39806"
},
{
"name": "CVE-2022-50414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50414"
},
{
"name": "CVE-2023-53521",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53521"
},
{
"name": "CVE-2023-53479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53479"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2023-53313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53313"
},
{
"name": "CVE-2023-53395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53395"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2022-50436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50436"
},
{
"name": "CVE-2022-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50271"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2023-53485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53485"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-39870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39870"
},
{
"name": "CVE-2022-50241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50241"
},
{
"name": "CVE-2025-39807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39807"
},
{
"name": "CVE-2022-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50258"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2023-53365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53365"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39922"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2023-53184",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53184"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50312"
},
{
"name": "CVE-2023-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53196"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2023-53501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53501"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2022-50340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50340"
},
{
"name": "CVE-2023-53331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53331"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2023-53440",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53440"
},
{
"name": "CVE-2025-39846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39846"
},
{
"name": "CVE-2022-50374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50374"
},
{
"name": "CVE-2022-50375",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50375"
},
{
"name": "CVE-2024-58239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58239"
},
{
"name": "CVE-2022-50460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50460"
},
{
"name": "CVE-2023-53307",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53307"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2023-53442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53442"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39844"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2023-53286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53286"
},
{
"name": "CVE-2023-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53207"
},
{
"name": "CVE-2025-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38605"
},
{
"name": "CVE-2022-50362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50362"
},
{
"name": "CVE-2023-53205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53205"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2023-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53226"
},
{
"name": "CVE-2023-53525",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53525"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2024-58240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58240"
},
{
"name": "CVE-2023-53249",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53249"
},
{
"name": "CVE-2023-53252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53252"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-53246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53246"
},
{
"name": "CVE-2023-53364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53364"
},
{
"name": "CVE-2022-50423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50423"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2022-50239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50239"
},
{
"name": "CVE-2022-50348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50348"
},
{
"name": "CVE-2023-53508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53508"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2023-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53213"
},
{
"name": "CVE-2023-53526",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53526"
},
{
"name": "CVE-2025-39891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39891"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2023-53255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53255"
},
{
"name": "CVE-2023-53277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53277"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2023-53379",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53379"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2023-4515",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4515"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2023-53343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53343"
},
{
"name": "CVE-2023-53299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53299"
},
{
"name": "CVE-2023-53268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53268"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2023-53204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53204"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2023-53333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53333"
},
{
"name": "CVE-2022-50394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50394"
},
{
"name": "CVE-2023-53456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53456"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2023-53446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53446"
},
{
"name": "CVE-2023-53463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53463"
},
{
"name": "CVE-2023-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53170"
},
{
"name": "CVE-2023-53260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53260"
},
{
"name": "CVE-2025-39854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39854"
},
{
"name": "CVE-2023-53386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53386"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-39830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39830"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2023-53181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53181"
},
{
"name": "CVE-2023-53174",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53174"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-39695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39695"
},
{
"name": "CVE-2022-50430",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50430"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2023-53295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53295"
},
{
"name": "CVE-2023-53298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53298"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2023-53507",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53507"
},
{
"name": "CVE-2023-53314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53314"
},
{
"name": "CVE-2023-53281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53281"
},
{
"name": "CVE-2023-53330",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53330"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2022-50422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50422"
},
{
"name": "CVE-2022-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50252"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2023-53316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53316"
},
{
"name": "CVE-2022-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50299"
},
{
"name": "CVE-2023-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53208"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2023-53315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53315"
},
{
"name": "CVE-2025-38736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38736"
},
{
"name": "CVE-2023-53297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53297"
},
{
"name": "CVE-2023-53499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53499"
},
{
"name": "CVE-2023-53513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53513"
},
{
"name": "CVE-2023-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53234"
},
{
"name": "CVE-2023-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53167"
},
{
"name": "CVE-2023-53342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53342"
},
{
"name": "CVE-2025-39678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39678"
},
{
"name": "CVE-2023-53414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53414"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-53265",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53265"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2022-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50246"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2023-53490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53490"
},
{
"name": "CVE-2023-53302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53302"
},
{
"name": "CVE-2023-53444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53444"
},
{
"name": "CVE-2023-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53175"
},
{
"name": "CVE-2022-50392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50392"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2022-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50233"
},
{
"name": "CVE-2023-53274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53274"
},
{
"name": "CVE-2025-39682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39682"
},
{
"name": "CVE-2022-50410",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50410"
},
{
"name": "CVE-2022-50428",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50428"
},
{
"name": "CVE-2023-39197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39197"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2025-39832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39832"
},
{
"name": "CVE-2023-53495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53495"
},
{
"name": "CVE-2023-53436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53436"
},
{
"name": "CVE-2022-50402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50402"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2022-50427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50427"
},
{
"name": "CVE-2022-50278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50278"
},
{
"name": "CVE-2023-53273",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53273"
},
{
"name": "CVE-2023-53377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53377"
},
{
"name": "CVE-2023-53500",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53500"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-39847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39847"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39835"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2022-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50279"
},
{
"name": "CVE-2023-53243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53243"
},
{
"name": "CVE-2023-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53219"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2023-53428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53428"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2022-50440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50440"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2022-50248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50248"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53147"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2024-53125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53125"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2022-50381",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50381"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2023-53201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53201"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2022-50385",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50385"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2022-50459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50459"
},
{
"name": "CVE-2023-53192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53192"
},
{
"name": "CVE-2022-50277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50277"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-53251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53251"
},
{
"name": "CVE-2023-53337",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53337"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2023-53380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53380"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2022-50369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50369"
},
{
"name": "CVE-2023-53153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53153"
}
],
"initial_release_date": "2025-10-24T00:00:00",
"last_revision_date": "2025-10-24T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0921",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03650-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503650-1"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03636-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503636-1"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03648-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503648-1"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03652-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503652-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20253761-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253761-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3736-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253736-1"
},
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3772-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253772-1"
},
{
"published_at": "2025-10-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03663-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503663-1"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03634-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503634-1"
},
{
"published_at": "2025-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3703-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253703-1"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03643-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503643-1"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03646-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503646-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3720-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253720-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3712-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253712-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3734-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253734-1"
},
{
"published_at": "2025-10-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03672-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503672-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3748-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253748-1"
},
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3770-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253770-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3751-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253751-1"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03638-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503638-1"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03628-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503628-1"
},
{
"published_at": "2025-10-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3679-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253679-1"
},
{
"published_at": "2025-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3704-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253704-1"
},
{
"published_at": "2025-10-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3684-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253684-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3733-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253733-1"
},
{
"published_at": "2025-10-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03671-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503671-1"
},
{
"published_at": "2025-10-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3675-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253675-1"
},
{
"published_at": "2025-10-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03664-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503664-1"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03633-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503633-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3755-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253755-1"
},
{
"published_at": "2025-10-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3683-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253683-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3716-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253716-1"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03653-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503653-1"
},
{
"published_at": "2025-10-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03666-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503666-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3725-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253725-1"
},
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3771-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253771-1"
},
{
"published_at": "2025-10-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03656-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503656-1"
},
{
"published_at": "2025-10-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03662-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503662-1"
},
{
"published_at": "2025-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3705-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253705-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3764-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253764-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3721-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253721-1"
},
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3768-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253768-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3717-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253717-1"
},
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3769-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253769-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3740-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253740-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20253762-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253762-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3741-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253741-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3742-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253742-1"
},
{
"published_at": "2025-10-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3731-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253731-1"
},
{
"published_at": "2025-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:3765-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253765-1"
}
]
}
CERTFR-2022-AVI-1122
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, un contournement de la politique de sécurité, une exécution de code arbitraire à distance, un problème de sécurité non spécifié par l'éditeur, une élévation de privilèges et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3542"
},
{
"name": "CVE-2022-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3577"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3535"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"initial_release_date": "2022-12-21T00:00:00",
"last_revision_date": "2022-12-21T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224566-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224580-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224551-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224569-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224560-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224589-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224577-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224562-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224587-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224595-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224585-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224550-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224559-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224561-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224572-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224573-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224574-1/"
}
],
"reference": "CERTFR-2022-AVI-1122",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un contournement de la politique de\ns\u00e9curit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance, un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une \u00e9l\u00e9vation de privil\u00e8ges et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4589-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4587-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4560-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4551-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4585-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4566-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4577-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4574-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4561-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4572-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4559-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4580-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4550-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4569-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4562-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4595-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4573-1 du 19 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0395
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP4 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 12 SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP4 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP4",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-30772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30772"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-2008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2008"
},
{
"name": "CVE-2023-1076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1076"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2023-2019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2019"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2023-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1390"
},
{
"name": "CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"name": "CVE-2023-1670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
},
{
"name": "CVE-2023-28464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28464"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2022-20567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20567"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2020-36691",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36691"
},
{
"name": "CVE-2023-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23006"
},
{
"name": "CVE-2023-1513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1513"
},
{
"name": "CVE-2023-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2483"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1611"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
}
],
"initial_release_date": "2023-05-19T00:00:00",
"last_revision_date": "2023-05-19T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0395",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0\ndistance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, un d\u00e9ni de service\u00a0\u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2232-1 du 17 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232232-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2231-1 du 17 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232231-1/"
}
]
}
CERTFR-2023-AVI-0210
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, une atteinte à l'intégrité des données, une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-47521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47521"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-20928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20928"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3344"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2023-20938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20938"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47519"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
}
],
"initial_release_date": "2023-03-10T00:00:00",
"last_revision_date": "2023-03-10T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0210",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une\nex\u00e9cution de code arbitraire \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5938-1 du 08 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5938-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0092-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/LSN-0092-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5924-1 du 06 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5924-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5919-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5919-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5940-1 du 09 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5940-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5939-1 du 08 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5939-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5926-1 du 06 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5926-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5934-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5934-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5941-1 du 09 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5941-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5929-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5929-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5925-1 du 06 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5925-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5918-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5918-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5928-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5928-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5927-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5927-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5920-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5920-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5917-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5917-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5935-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5935-1"
}
]
}
CERTFR-2023-AVI-0047
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3061"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
}
],
"initial_release_date": "2023-01-20T00:00:00",
"last_revision_date": "2023-01-20T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 19 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5815-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 17 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5808-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 19 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5814-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 13 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5804-2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 19 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5813-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 17 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5809-1"
}
],
"reference": "CERTFR-2023-AVI-0047",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5808-1 du 17 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5813-1 du 19 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5814-1 du 19 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5815-1 du 19 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5809-1 du 17 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5804-2 du 13 janvier 2023",
"url": null
}
]
}
CERTFR-2023-AVI-0068
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
}
],
"initial_release_date": "2023-01-27T00:00:00",
"last_revision_date": "2023-01-27T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 25 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5829-1"
}
],
"reference": "CERTFR-2023-AVI-0068",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance et une ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5829-1 du 25 janvier 2023",
"url": null
}
]
}
CERTFR-2023-AVI-0382
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données, une élévation de privilèges, une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | Public Cloud Module | Public Cloud Module 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP1 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | Legacy Module 15-SP4 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP1 | ||
| SUSE | N/A | Development Tools Module 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP4",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP4",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP3",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-30772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30772"
},
{
"name": "CVE-2023-2008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2008"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2023-2019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2019"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2023-1670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2023-1872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1872"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2020-36691",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36691"
},
{
"name": "CVE-2023-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23006"
},
{
"name": "CVE-2023-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2483"
},
{
"name": "CVE-2023-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1611"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
}
],
"initial_release_date": "2023-05-12T00:00:00",
"last_revision_date": "2023-05-12T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 11 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232163-1/"
}
],
"reference": "CERTFR-2023-AVI-0382",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2147-1 du 09 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232147-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2141-1 du 09 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232141-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2151-1 du 09 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2156-1 du 10 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232156-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2162-1 du 10 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232162-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2140-1 du 09 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232140-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2146-1 du 09 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232146-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:2148-1 du 09 mai 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232148-1/"
}
]
}
CERTFR-2022-AVI-1113
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, un contournement de la politique de sécurité et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2022-33743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
}
],
"initial_release_date": "2022-12-16T00:00:00",
"last_revision_date": "2022-12-16T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 14 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5779-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 12 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5773-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 14 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5780-1"
}
],
"reference": "CERTFR-2022-AVI-1113",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un contournement de la politique de\ns\u00e9curit\u00e9 et une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5779-1 du 14 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5780-1 du 14 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5773-1 du 12 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-1115
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance, un problème de sécurité non spécifié par l'éditeur, une atteinte à la confidentialité des données, un contournement de la politique de sécurité, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3577"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
}
],
"initial_release_date": "2022-12-19T00:00:00",
"last_revision_date": "2022-12-19T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224539-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224516-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224545-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224546-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224533-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224534-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224518-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224520-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224506-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224513-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224504-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224528-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224542-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224515-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224503-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224517-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224543-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224505-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224527-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224510-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224544-1/"
}
],
"reference": "CERTFR-2022-AVI-1115",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9, une ex\u00e9cution\nde code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4527-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4504-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4518-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4542-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4505-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4517-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4506-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4545-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4510-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4539-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4516-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4520-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4503-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4515-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4546-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4528-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4543-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4544-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4533-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4513-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4534-1 du 17 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-1114
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services pour SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services pour SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 9.0 x86_64 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services pour SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services pour SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"name": "CVE-2022-23816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23816"
}
],
"initial_release_date": "2022-12-16T00:00:00",
"last_revision_date": "2022-12-16T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 13 d\u00e9cembre 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:8941"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 13 d\u00e9cembre 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 13 d\u00e9cembre 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:8940"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 13 d\u00e9cembre 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"reference": "CERTFR-2022-AVI-1114",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de Red Hat\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:8974 du 13 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:8941 du 13 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:8973 du 13 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:8940 du 13 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0192
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-47521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47521"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-20928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20928"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3344"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2023-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0210"
},
{
"name": "CVE-2023-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0469"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47519"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
}
],
"initial_release_date": "2023-03-03T00:00:00",
"last_revision_date": "2023-03-03T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0192",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5911-1 du 02 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5911-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5914-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5914-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5912-1 du 02 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5912-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5913-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5913-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5916-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5916-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5915-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5915-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5909-1 du 02 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5909-1"
}
]
}
CERTFR-2023-AVI-0067
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3077"
}
],
"initial_release_date": "2023-01-27T00:00:00",
"last_revision_date": "2023-01-27T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0399"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 23 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0400"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0395"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0440"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 24 janvier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0392"
}
],
"reference": "CERTFR-2023-AVI-0067",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de Red Hat\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un\ncontournement de la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0392 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0440 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0399 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0400 du 24 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0334 du 23 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2023:0395 du 24 janvier 2023",
"url": null
}
]
}
CERTFR-2023-AVI-0091
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
}
],
"initial_release_date": "2023-02-03T00:00:00",
"last_revision_date": "2023-02-03T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 27 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5831-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 30 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5832-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 27 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5830-1"
}
],
"reference": "CERTFR-2023-AVI-0091",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-02-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service\u00a0\u00e0 distance et une ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5832-1 du 30 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5830-1 du 27 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5831-1 du 27 janvier 2023",
"url": null
}
]
}
CERTFR-2022-AVI-1075
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
}
],
"initial_release_date": "2022-12-05T00:00:00",
"last_revision_date": "2022-12-05T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 02 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5756-2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 02 d\u00e9cembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5755-2"
}
],
"reference": "CERTFR-2022-AVI-1075",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9, une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5755-2 du 02 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5756-2 du 02 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0010
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-33743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
}
],
"initial_release_date": "2023-01-06T00:00:00",
"last_revision_date": "2023-01-06T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 05 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5789-1"
}
],
"reference": "CERTFR-2023-AVI-0010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire et un d\u00e9ni de\nservice.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5789-1 du 05 janvier 2023",
"url": null
}
]
}
CERTFR-2024-AVI-0027
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | CTPView versions versions antérieures à 9.1R5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved version antérieures à 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO | ||
| Juniper Networks | N/A | Paragon Active Assurance versions antérieures à 3.1.2, 3.2.3, 3.3.2 et 3.4.1 | ||
| Juniper Networks | Junos OS | Junos OS version antérieures à 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à SSR-6.2.3-r2 | ||
| Juniper Networks | N/A | Security Director Insights versions antérieures à 23.1R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CTPView versions versions ant\u00e9rieures \u00e0 9.1R5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved version ant\u00e9rieures \u00e0 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance versions ant\u00e9rieures \u00e0 3.1.2, 3.2.3, 3.3.2 et 3.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS version ant\u00e9rieures \u00e0 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-6.2.3-r2",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director Insights versions ant\u00e9rieures \u00e0 23.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2024-21602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21602"
},
{
"name": "CVE-2022-41974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41974"
},
{
"name": "CVE-2023-38802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38802"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-41973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41973"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2024-21616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21616"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2024-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21599"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2024-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21614"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2024-21607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21607"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2021-4104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4104"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2024-21596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21596"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
},
{
"name": "CVE-2024-21604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21604"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2020-9493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9493"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2024-21600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21600"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2024-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21606"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-21591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21591"
},
{
"name": "CVE-2020-12321",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2024-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21587"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-4254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4254"
},
{
"name": "CVE-2024-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21617"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2024-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21589"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21595"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-22164",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22164"
},
{
"name": "CVE-2024-21597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21597"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38023"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2024-21611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21611"
},
{
"name": "CVE-2024-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21613"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-21612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21612"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2024-21603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21603"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21585"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2023-36842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36842"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2024-21594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21594"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2024-21601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21601"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
}
],
"initial_release_date": "2024-01-11T00:00:00",
"last_revision_date": "2024-01-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0027",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75723 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75741 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75752 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75757 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75730 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75734 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75737 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Security-Director-Insights-Multiple-vulnerabilities-in-SDI"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75721 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75736 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-CTPView-Multiple-vulnerabilities-in-CTPView-CVE-yyyy-nnnn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75747 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75758 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-Evolved-Telnet-service-may-be-enabled-when-it-is-expected-to-be-disabled-CVE-2022-22164"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75727 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Paragon-Active-Assurance-Control-Center-Information-disclosure-vulnerability-CVE-2024-21589"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75233 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75754 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75753 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75742 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75740 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75748 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75744 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75743 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75738 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75733 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75725 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75755 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75735 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75745 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75729 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591"
}
]
}
CERTFR-2023-AVI-0112
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une exécution de code arbitraire à distance, un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-47940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47940"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-3543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3543"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
}
],
"initial_release_date": "2023-02-10T00:00:00",
"last_revision_date": "2023-02-10T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5862-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5856-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5861-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5858-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5857-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5853-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5863-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5859-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5854-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5860-1"
}
],
"reference": "CERTFR-2023-AVI-0112",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-02-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un contournement de la politique de\ns\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5853-1 du 09 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5854-1 du 09 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5862-1 du 09 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5857-1 du 09 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5861-1 du 09 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5860-1 du 09 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5859-1 du 09 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5863-1 du 09 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5858-1 du 09 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5856-1 du 09 f\u00e9vrier 2023",
"url": null
}
]
}
CERTFR-2022-AVI-1125
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS), une élévation de privilèges, un déni de service, un contournement de la politique de sécurité, une atteinte à l'intégrité des données, une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3-BCL | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP4 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.2 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Realtime Extension 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Realtime Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-2977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2021-33135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33135"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2020-36516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2016-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3695"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-3526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3526"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3078"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3542"
},
{
"name": "CVE-2022-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3577"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2022-3202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3202"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-40476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40476"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-3535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3535"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2022-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2938"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-1263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"initial_release_date": "2022-12-26T00:00:00",
"last_revision_date": "2022-12-26T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224616-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224613-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224611-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224615-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224614-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224617-1/"
}
],
"reference": "CERTFR-2022-AVI-1125",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es,\nune injection de code indirecte \u00e0 distance (XSS), une \u00e9l\u00e9vation de\nprivil\u00e8ges, un d\u00e9ni de service, un contournement de la politique de\ns\u00e9curit\u00e9, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une ex\u00e9cution de code\narbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4616-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4617-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4614-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4611-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4613-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4615-1 du 23 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0168
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans RedHat. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
}
],
"initial_release_date": "2023-02-24T00:00:00",
"last_revision_date": "2023-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0168",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eRedHat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:0856 du 21 f\u00e9vrier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0856"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:0854 du 21 f\u00e9vrier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:0832 du 21 f\u00e9vrier 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
]
}
CERTFR-2025-AVI-0895
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
| SUSE | Confidential Computing Module | Confidential Computing Module 15-SP6 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | Legacy Module | Legacy Module 15-SP6 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Enterprise Storage | SUSE Enterprise Storage 7.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | Development Tools Module | Development Tools Module 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | Legacy Module | Legacy Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | Development Tools Module | Development Tools Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Confidential Computing Module 15-SP6",
"product": {
"name": "Confidential Computing Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP6",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP6",
"product": {
"name": "Legacy Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP6",
"product": {
"name": "Development Tools Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "Legacy Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "Development Tools Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-53443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53443"
},
{
"name": "CVE-2023-53453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53453"
},
{
"name": "CVE-2022-50378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50378"
},
{
"name": "CVE-2025-38380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38380"
},
{
"name": "CVE-2022-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50291"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2022-50433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50433"
},
{
"name": "CVE-2022-50356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50356"
},
{
"name": "CVE-2023-53473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53473"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2022-50367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50367"
},
{
"name": "CVE-2025-39808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39808"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-53475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53475"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2023-53312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53312"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2023-53311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53311"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2022-50398",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50398"
},
{
"name": "CVE-2023-53393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53393"
},
{
"name": "CVE-2023-53480",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53480"
},
{
"name": "CVE-2023-53303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53303"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2022-50469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50469"
},
{
"name": "CVE-2022-50429",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50429"
},
{
"name": "CVE-2023-53193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53193"
},
{
"name": "CVE-2023-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53150"
},
{
"name": "CVE-2023-53321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53321"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2023-53317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53317"
},
{
"name": "CVE-2023-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53176"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2022-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50298"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2022-50288",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50288"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-53349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53349"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2023-53405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53405"
},
{
"name": "CVE-2023-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53185"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2023-53359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53359"
},
{
"name": "CVE-2022-50466",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50466"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2023-53441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53441"
},
{
"name": "CVE-2023-53199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53199"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2023-53245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53245"
},
{
"name": "CVE-2023-53415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53415"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2024-53194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53194"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2022-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50255"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2023-53461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53461"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2023-53531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53531"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2023-53449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53449"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2023-53451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53451"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2022-50368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50368"
},
{
"name": "CVE-2023-53511",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53511"
},
{
"name": "CVE-2025-38216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38216"
},
{
"name": "CVE-2022-50349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50349"
},
{
"name": "CVE-2023-53394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53394"
},
{
"name": "CVE-2023-53494",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53494"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-39811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39811"
},
{
"name": "CVE-2022-50358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50358"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50386"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-50244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50244"
},
{
"name": "CVE-2025-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38563"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2023-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53222"
},
{
"name": "CVE-2023-53264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53264"
},
{
"name": "CVE-2022-50323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50323"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2022-50441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50441"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2023-53519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53519"
},
{
"name": "CVE-2022-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50294"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2023-53472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53472"
},
{
"name": "CVE-2022-50242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50242"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2025-22023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22023"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2023-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53217"
},
{
"name": "CVE-2023-53390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53390"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-39920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39920"
},
{
"name": "CVE-2022-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50379"
},
{
"name": "CVE-2022-50257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50257"
},
{
"name": "CVE-2023-53354",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53354"
},
{
"name": "CVE-2023-53504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53504"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2022-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50301"
},
{
"name": "CVE-2022-50432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50432"
},
{
"name": "CVE-2023-53340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53340"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2023-52923",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52923"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2023-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53189"
},
{
"name": "CVE-2023-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53427"
},
{
"name": "CVE-2023-53498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53498"
},
{
"name": "CVE-2023-4130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4130"
},
{
"name": "CVE-2023-53242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53242"
},
{
"name": "CVE-2022-50395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50395"
},
{
"name": "CVE-2023-53309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53309"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2022-50456",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50456"
},
{
"name": "CVE-2025-39751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39751"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2023-53425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53425"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2022-50321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50321"
},
{
"name": "CVE-2023-53235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53235"
},
{
"name": "CVE-2025-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38565"
},
{
"name": "CVE-2022-50439",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50439"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2023-53304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53304"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2023-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53216"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2023-53339",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53339"
},
{
"name": "CVE-2023-53239",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53239"
},
{
"name": "CVE-2023-53280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53280"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53179"
},
{
"name": "CVE-2022-50434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50434"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2022-50353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50353"
},
{
"name": "CVE-2023-53493",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53493"
},
{
"name": "CVE-2022-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49975"
},
{
"name": "CVE-2022-50404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50404"
},
{
"name": "CVE-2023-53492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53492"
},
{
"name": "CVE-2023-31248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31248"
},
{
"name": "CVE-2022-50360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50360"
},
{
"name": "CVE-2023-53388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53388"
},
{
"name": "CVE-2025-39853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39853"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2022-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50264"
},
{
"name": "CVE-2025-39871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39871"
},
{
"name": "CVE-2025-39857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39857"
},
{
"name": "CVE-2022-50452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50452"
},
{
"name": "CVE-2022-50320",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50320"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2022-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50286"
},
{
"name": "CVE-2022-50449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50449"
},
{
"name": "CVE-2023-53431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53431"
},
{
"name": "CVE-2022-50324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50324"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2023-53462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53462"
},
{
"name": "CVE-2025-39865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39865"
},
{
"name": "CVE-2025-39816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39816"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2022-50447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50447"
},
{
"name": "CVE-2022-50251",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50251"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2023-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53148"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2022-50373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50373"
},
{
"name": "CVE-2023-53505",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53505"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2022-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50269"
},
{
"name": "CVE-2023-53275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53275"
},
{
"name": "CVE-2022-50437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50437"
},
{
"name": "CVE-2022-50391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50391"
},
{
"name": "CVE-2023-53476",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53476"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2023-53468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53468"
},
{
"name": "CVE-2022-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50261"
},
{
"name": "CVE-2022-50351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50351"
},
{
"name": "CVE-2022-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50272"
},
{
"name": "CVE-2022-50331",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50331"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-39823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39823"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2024-50154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50154"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2023-53183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53183"
},
{
"name": "CVE-2023-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53195"
},
{
"name": "CVE-2023-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53232"
},
{
"name": "CVE-2025-39864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39864"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50268"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2023-53319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53319"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-39824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39824"
},
{
"name": "CVE-2023-53515",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53515"
},
{
"name": "CVE-2023-53420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53420"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2023-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53241"
},
{
"name": "CVE-2023-53305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53305"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2023-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53177"
},
{
"name": "CVE-2023-53381",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53381"
},
{
"name": "CVE-2023-53369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53369"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-50419",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50419"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2023-53328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53328"
},
{
"name": "CVE-2022-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50289"
},
{
"name": "CVE-2022-50329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50329"
},
{
"name": "CVE-2025-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39842"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2023-53165",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53165"
},
{
"name": "CVE-2023-53270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53270"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2023-53284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53284"
},
{
"name": "CVE-2022-50265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50265"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-39849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39849"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2022-50409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50409"
},
{
"name": "CVE-2022-50453",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50453"
},
{
"name": "CVE-2023-53512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53512"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2023-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53238"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2025-39861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39861"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2022-50405",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50405"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2023-53378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53378"
},
{
"name": "CVE-2025-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38597"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2022-50333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50333"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2023-53360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53360"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2023-53336",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53336"
},
{
"name": "CVE-2023-53426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53426"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2022-50330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50330"
},
{
"name": "CVE-2023-53223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53223"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2022-50309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50309"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2023-53448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53448"
},
{
"name": "CVE-2023-53308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53308"
},
{
"name": "CVE-2023-53374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53374"
},
{
"name": "CVE-2023-53384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53384"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2022-50297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50297"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2022-50435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50435"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2022-50411",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50411"
},
{
"name": "CVE-2022-50465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50465"
},
{
"name": "CVE-2022-50346",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50346"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2023-53458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53458"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2022-50417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50417"
},
{
"name": "CVE-2023-53326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53326"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-53457",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53457"
},
{
"name": "CVE-2025-39845",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39845"
},
{
"name": "CVE-2023-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53230"
},
{
"name": "CVE-2023-53397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53397"
},
{
"name": "CVE-2023-53171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53171"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2023-53489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53489"
},
{
"name": "CVE-2022-50370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50370"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2023-53516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53516"
},
{
"name": "CVE-2023-53474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53474"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2022-50325",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50325"
},
{
"name": "CVE-2022-50355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50355"
},
{
"name": "CVE-2023-53400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53400"
},
{
"name": "CVE-2022-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50292"
},
{
"name": "CVE-2023-53287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53287"
},
{
"name": "CVE-2025-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38616"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2022-50454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50454"
},
{
"name": "CVE-2023-53350",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53350"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2023-53237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53237"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2023-53454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53454"
},
{
"name": "CVE-2023-53471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53471"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38541"
},
{
"name": "CVE-2023-53416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53416"
},
{
"name": "CVE-2022-50344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50344"
},
{
"name": "CVE-2023-53322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53322"
},
{
"name": "CVE-2023-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53220"
},
{
"name": "CVE-2023-53272",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53272"
},
{
"name": "CVE-2022-50388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50388"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2023-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53210"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2021-4460",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4460"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2023-53259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53259"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2022-50318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50318"
},
{
"name": "CVE-2023-53413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53413"
},
{
"name": "CVE-2022-50389",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50389"
},
{
"name": "CVE-2023-53528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53528"
},
{
"name": "CVE-2023-53524",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53524"
},
{
"name": "CVE-2023-53496",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53496"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2023-53257",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53257"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2023-53523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53523"
},
{
"name": "CVE-2022-50359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50359"
},
{
"name": "CVE-2023-53357",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53357"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2022-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50285"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-53335",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53335"
},
{
"name": "CVE-2023-53488",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53488"
},
{
"name": "CVE-2023-53464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53464"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2023-53334",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53334"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2023-53356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53356"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2023-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53151"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2022-50352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50352"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2022-50342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50342"
},
{
"name": "CVE-2023-53288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53288"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2023-53406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53406"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2023-53352",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53352"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2023-53291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53291"
},
{
"name": "CVE-2022-50408",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50408"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2022-50399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50399"
},
{
"name": "CVE-2022-50372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50372"
},
{
"name": "CVE-2025-39834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39834"
},
{
"name": "CVE-2022-50431",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50431"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2023-53263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53263"
},
{
"name": "CVE-2023-53527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53527"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2023-53404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53404"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-38678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38678"
},
{
"name": "CVE-2023-53344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53344"
},
{
"name": "CVE-2023-53324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53324"
},
{
"name": "CVE-2023-53465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53465"
},
{
"name": "CVE-2022-50468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50468"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2023-53368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53368"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2022-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50282"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2023-53276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53276"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38628"
},
{
"name": "CVE-2023-53518",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53518"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2025-39860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39860"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2022-50347",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50347"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2023-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53506"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2023-53398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53398"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2022-50443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50443"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2023-53409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53409"
},
{
"name": "CVE-2023-53396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53396"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-39839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39839"
},
{
"name": "CVE-2023-53282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53282"
},
{
"name": "CVE-2025-39848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39848"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2023-53435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53435"
},
{
"name": "CVE-2022-50328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50328"
},
{
"name": "CVE-2023-53391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53391"
},
{
"name": "CVE-2023-53487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53487"
},
{
"name": "CVE-2022-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50267"
},
{
"name": "CVE-2023-53437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53437"
},
{
"name": "CVE-2022-50317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50317"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2023-53250",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53250"
},
{
"name": "CVE-2023-53338",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53338"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50235"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2023-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53206"
},
{
"name": "CVE-2022-50364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50364"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2022-50276",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50276"
},
{
"name": "CVE-2023-53432",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53432"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2023-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3867"
},
{
"name": "CVE-2022-50401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50401"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2022-50376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50376"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2023-53422",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53422"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2023-53244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53244"
},
{
"name": "CVE-2022-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50275"
},
{
"name": "CVE-2023-53373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53373"
},
{
"name": "CVE-2022-50287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50287"
},
{
"name": "CVE-2023-53375",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53375"
},
{
"name": "CVE-2025-39882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39882"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2022-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50308"
},
{
"name": "CVE-2023-53530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53530"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2023-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53197"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2023-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53229"
},
{
"name": "CVE-2025-39806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39806"
},
{
"name": "CVE-2022-50414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50414"
},
{
"name": "CVE-2023-53521",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53521"
},
{
"name": "CVE-2023-53479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53479"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2023-53313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53313"
},
{
"name": "CVE-2023-53395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53395"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2022-50339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50339"
},
{
"name": "CVE-2022-50436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50436"
},
{
"name": "CVE-2022-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50271"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2023-53485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53485"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-39870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39870"
},
{
"name": "CVE-2022-50241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50241"
},
{
"name": "CVE-2025-39807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39807"
},
{
"name": "CVE-2022-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50258"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2023-53365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53365"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39922"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2023-53184",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53184"
},
{
"name": "CVE-2022-50365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50365"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50312"
},
{
"name": "CVE-2023-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53196"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2023-53501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53501"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2022-50340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50340"
},
{
"name": "CVE-2023-53331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53331"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2023-53440",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53440"
},
{
"name": "CVE-2025-39846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39846"
},
{
"name": "CVE-2022-50374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50374"
},
{
"name": "CVE-2022-50375",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50375"
},
{
"name": "CVE-2024-58239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58239"
},
{
"name": "CVE-2022-50460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50460"
},
{
"name": "CVE-2023-53307",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53307"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2023-53442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53442"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39844"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2023-53286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53286"
},
{
"name": "CVE-2023-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53207"
},
{
"name": "CVE-2025-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38605"
},
{
"name": "CVE-2022-50362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50362"
},
{
"name": "CVE-2023-53205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53205"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2023-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53226"
},
{
"name": "CVE-2023-53525",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53525"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2024-58240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58240"
},
{
"name": "CVE-2023-53249",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53249"
},
{
"name": "CVE-2023-53252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53252"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2022-50396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50396"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-53246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53246"
},
{
"name": "CVE-2024-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53168"
},
{
"name": "CVE-2023-53364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53364"
},
{
"name": "CVE-2022-50423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50423"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2022-50239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50239"
},
{
"name": "CVE-2023-53532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53532"
},
{
"name": "CVE-2022-50348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50348"
},
{
"name": "CVE-2023-53508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53508"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2023-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53213"
},
{
"name": "CVE-2023-53526",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53526"
},
{
"name": "CVE-2025-39891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39891"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2023-53255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53255"
},
{
"name": "CVE-2023-53277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53277"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2023-53379",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53379"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2023-4515",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4515"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2023-53343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53343"
},
{
"name": "CVE-2023-53299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53299"
},
{
"name": "CVE-2023-53268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53268"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2023-53204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53204"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2023-53333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53333"
},
{
"name": "CVE-2022-50394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50394"
},
{
"name": "CVE-2023-53456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53456"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2023-53446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53446"
},
{
"name": "CVE-2023-53463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53463"
},
{
"name": "CVE-2023-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53170"
},
{
"name": "CVE-2023-53260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53260"
},
{
"name": "CVE-2025-39854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39854"
},
{
"name": "CVE-2023-53386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53386"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-39830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39830"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2023-53181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53181"
},
{
"name": "CVE-2023-53174",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53174"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-39695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39695"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2022-50430",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50430"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2023-53295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53295"
},
{
"name": "CVE-2023-53298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53298"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2023-53507",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53507"
},
{
"name": "CVE-2023-53314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53314"
},
{
"name": "CVE-2023-53281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53281"
},
{
"name": "CVE-2023-53330",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53330"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2022-50422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50422"
},
{
"name": "CVE-2022-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50252"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2023-53316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53316"
},
{
"name": "CVE-2022-50412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50412"
},
{
"name": "CVE-2022-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50299"
},
{
"name": "CVE-2023-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53208"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2023-53315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53315"
},
{
"name": "CVE-2025-38736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38736"
},
{
"name": "CVE-2023-53297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53297"
},
{
"name": "CVE-2023-53499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53499"
},
{
"name": "CVE-2023-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53234"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2023-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53167"
},
{
"name": "CVE-2023-53342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53342"
},
{
"name": "CVE-2025-39678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39678"
},
{
"name": "CVE-2023-53414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53414"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-53265",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53265"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2022-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50246"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2023-53490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53490"
},
{
"name": "CVE-2023-53302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53302"
},
{
"name": "CVE-2023-53482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53482"
},
{
"name": "CVE-2023-53444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53444"
},
{
"name": "CVE-2023-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53175"
},
{
"name": "CVE-2022-50392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50392"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2022-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50233"
},
{
"name": "CVE-2023-53274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53274"
},
{
"name": "CVE-2025-39682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39682"
},
{
"name": "CVE-2022-50410",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50410"
},
{
"name": "CVE-2022-50428",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50428"
},
{
"name": "CVE-2023-39197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39197"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2025-39832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39832"
},
{
"name": "CVE-2023-53495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53495"
},
{
"name": "CVE-2023-53436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53436"
},
{
"name": "CVE-2022-50402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50402"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2022-50427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50427"
},
{
"name": "CVE-2022-50278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50278"
},
{
"name": "CVE-2023-53273",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53273"
},
{
"name": "CVE-2023-53377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53377"
},
{
"name": "CVE-2023-53500",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53500"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-39847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39847"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39835"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2022-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50279"
},
{
"name": "CVE-2023-53243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53243"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2023-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53219"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2023-53428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53428"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2022-50440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50440"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2022-50248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50248"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53147"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2022-50311",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50311"
},
{
"name": "CVE-2024-53125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53125"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2022-50381",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50381"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2023-53201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53201"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2022-50385",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50385"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2022-50459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50459"
},
{
"name": "CVE-2023-53192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53192"
},
{
"name": "CVE-2022-50277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50277"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-53251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53251"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2023-53337",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53337"
},
{
"name": "CVE-2023-53380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53380"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2022-50369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50369"
},
{
"name": "CVE-2023-53153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53153"
}
],
"initial_release_date": "2025-10-17T00:00:00",
"last_revision_date": "2025-10-17T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0895",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03615-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503615-1"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03553-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503553-1"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03557-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503557-1"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03539-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503539-1"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03543-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503543-1"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03580-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503580-1"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03613-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503613-1"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03600-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503600-1"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03602-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503602-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03561-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503561-1"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03614-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503614-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03567-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503567-1"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03554-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503554-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03576-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503576-1"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03626-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503626-1"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03548-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503548-1"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03551-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503551-1"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03601-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503601-1"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03578-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503578-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03575-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503575-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03562-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503562-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03572-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503572-1"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03550-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503550-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03568-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503568-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03569-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503569-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03563-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503563-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03566-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503566-1"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03555-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503555-1"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03529-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503529-1"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03538-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503538-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03571-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503571-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03559-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503559-1"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03528-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503528-1"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03583-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503583-1"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03552-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503552-1"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03577-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503577-1"
}
]
}
CERTFR-2023-AVI-0027
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3977"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-3910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3910"
},
{
"name": "CVE-2022-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3544"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3541"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0171"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-3543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3543"
},
{
"name": "CVE-2022-3061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3061"
},
{
"name": "CVE-2021-4159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4159"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
}
],
"initial_release_date": "2023-01-13T00:00:00",
"last_revision_date": "2023-01-13T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5791-2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 06 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5794-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 06 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5792-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 12 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5802-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 10 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5793-3"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 10 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5791-3"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 11 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5799-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 06 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5791-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5792-2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 06 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5793-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 09 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5793-2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 06 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5790-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 13 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5803-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 10 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5793-4"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 13 janvier 2023",
"url": "https://ubuntu.com/security/notices/USN-5804-1"
}
],
"reference": "CERTFR-2023-AVI-0027",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5793-4 du 10 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5793-1 du 06 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5791-2 du 09 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5791-1 du 06 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5792-2 du 09 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5791-3 du 10 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5804-1 du 13 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5790-1 du 06 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5794-1 du 06 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5792-1 du 06 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5802-1 du 12 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5793-3 du 10 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5803-1 du 13 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5799-1 du 11 janvier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5793-2 du 09 janvier 2023",
"url": null
}
]
}
CERTFR-2023-AVI-0147
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service, un contournement de la politique de sécurité, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-20928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20928"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-47940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47940"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0171"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-3543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3543"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-3061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3061"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
}
],
"initial_release_date": "2023-02-17T00:00:00",
"last_revision_date": "2023-02-17T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 16 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5879-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 15 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5876-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 16 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5878-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 15 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5877-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 14 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/LSN-0091-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 15 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5875-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 10 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5865-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 15 f\u00e9vrier 2023",
"url": "https://ubuntu.com/security/notices/USN-5874-1"
}
],
"reference": "CERTFR-2023-AVI-0147",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-02-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9, une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5877-1 du 15 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5878-1 du 16 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5879-1 du 16 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5875-1 du 15 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5874-1 du 15 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0091-1 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5865-1 du 10 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5876-1 du 15 f\u00e9vrier 2023",
"url": null
}
]
}
rhsa-2022:8973
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)\n\n* kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)\n\n* hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)\n\n* hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)\n\n* hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)\n\n* hw: cpu: AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)\n\n* hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)\n\n* hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sched/pelt: Fix attach_entity_load_avg() corner case (BZ#2105360)\n\n* RHEL9[fleetwood][P9]:kdump fails to capture vmcore when crash is triggered while running forkoff. (BZ#2109144)\n\n* ISST-LTE:[P10 Everest] [5.14.0-70.9.1.el9_0.ppc64le] HPT:RHEL9.0:ecolp95: lpar crashed at __list_del_entry_valid+0x90/0x100 and LPM failed (BZ#2112823)\n\n* [rhel9] livepatch panic: RIP: 0010:0xffffffffc0e070c4 seq_read_iter+0x124/0x4b0 (BZ#2122625)\n\n* System crashes due to list_add double add at iwl_mvm_mac_wake_tx_queue+0x71 (BZ#2123315)\n\n* [Dell EMC 9.0 BUG] Any process performing I/O doesn\u0027t fail on degraded LVM RAID and IO process hangs (BZ#2126215)\n\n* [HPEMC RHEL 9.0 REGRESSION] net, e810, ice: not enough device MSI-X vectors (BZ#2126491)\n\n* RHEL9.0 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127874)\n\n* Enable check-kabi (BZ#2132372)\n\n* Add symbols to stablelist (BZ#2132373)\n\n* Update RHEL9.1 kabi tooling (BZ#2132380)\n\n* kABI: Prepare the MM subsystem for kABI lockdown (BZ#2133464)\n\n* [Dell Storage 9.1 BUG] NVME command hang during storage array node reboot (BZ#2133553)\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134589)\n\n* crypto/testmgr.c should not list dh, ecdh-nist-p256, ecdh-nist-p384 as .fips_allowed = 1 (BZ#2136523)\n\n* FIPS self-tests for RSA pkcs7 signature verification (BZ#2136552)\n\n* [ovs-tc] Bad length in dpctl/dump-flows (BZ#2137354)\n\n* [RHEL9] s_pf0vf2: hw csum failure for mlx5 (BZ#2137355)\n\n* kernel memory leak while freeing nested actions (BZ#2137356)\n\n* ovs: backports from upstream (BZ#2137358)\n\n* kernel should conform to FIPS-140-3 requirements (both parts) (BZ#2139095)\n\n* [DELL EMC 9.0-RT BUG] System is not booting into RT Kernel with perc12. (BZ#2139214)\n\n* Fix panic in nbd/004 test (BZ#2139535)\n\n* Nested KVM is not working on RHEL 8.6 with hardware error 0x7 (BZ#2140141)\n\n* [RHEL9] Practically limit \"Dummy wait\" workaround to old Intel systems (BZ#2142169)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8973",
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8973.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-23T12:14:44+00:00",
"generator": {
"date": "2025-10-23T12:14:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:8973",
"initial_release_date": "2022-12-13T16:09:28+00:00",
"revision_history": [
{
"date": "2022-12-13T16:09:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-13T16:09:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T12:14:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"product_id": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.36.1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.36.1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.src",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.src",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Gaoning Pan",
"Yongkang Jia"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2069793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1158"
},
{
"category": "external",
"summary": "RHBZ#2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
"url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
}
],
"release_date": "2022-04-07T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084479"
}
],
"notes": [
{
"category": "description",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "RHBZ#2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
}
],
"release_date": "2022-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
},
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090237"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "RHBZ#2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090240"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "RHBZ#2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090241"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup in specific special register write operations for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "RHBZ#2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-23816",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23816"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2022-23825",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23825"
},
{
"category": "external",
"summary": "RHBZ#2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2115065"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. In certain processors with Intel\u0027s Enhanced Indirect Branch Restricted Speculation (eIBRS) capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer (RSB) prediction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "RHBZ#2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "RHSB-6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"
}
],
"release_date": "2022-08-09T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-28693",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: information disclosure via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "RHBZ#2107465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: information disclosure via local access"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-29900",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"Kaveh Razavi",
"Johannes Wikner"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-29901",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel(R) processors may potentially allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "RHBZ#2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
},
{
"cve": "CVE-2022-49086",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347770"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open vSwitch module in the Linux kernel. Improper handling of allocated memory can lead to a memory leak, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: openvswitch: fix leak of nested actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.4, 8.7, 9.0 and 9.1 via RHSA-2022:5626 [1], RHSA-2022:7683 [2], RHSA-2022:8973 [3] and RHSA-2022:8267 [4], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2022:5626\n\n[2]. https://access.redhat.com/errata/RHSA-2022:7683\n\n[3]. https://access.redhat.com/errata/RHSA-2022:8973\n\n[4]. https://access.redhat.com/errata/RHSA-2022:8267",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49086"
},
{
"category": "external",
"summary": "RHBZ#2347770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347770"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49086"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: openvswitch: fix leak of nested actions"
},
{
"cve": "CVE-2022-49611",
"cwe": {
"id": "CWE-1037",
"name": "Processor Optimization Removal or Modification of Security-critical Code"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348077"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/speculation: Fill RSB on vmexit for IBRS\n\nPrevent RSB underflow/poisoning attacks with RSB. While at it, add a\nbunch of comments to attempt to document the current state of tribal\nknowledge about RSB attacks and what exactly is being mitigated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/speculation: Fill RSB on vmexit for IBRS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49611"
},
{
"category": "external",
"summary": "RHBZ#2348077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348077"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49611",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49611"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: x86/speculation: Fill RSB on vmexit for IBRS"
}
]
}
rhsa-2023:0300
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)\n\n* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863)\n\n* kernel-rt: update RT source tree to the latest RHEL-9.1.z1 Batch (BZ#2141817)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0300",
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0300.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:42:17+00:00",
"generator": {
"date": "2025-10-09T22:42:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0300",
"initial_release_date": "2023-01-23T15:23:35+00:00",
"revision_history": [
{
"date": "2023-01-23T15:23:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-23T15:23:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"product": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"product_id": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-162.12.1.rt21.175.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-3077",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2123309"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. In particular, the userspace controllable \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and then used as the size of a memcpy, thus possibly writing beyond the end of dma_buffer. This flaw could allow a privileged local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for I2C_SMBUS_BLOCK_PROC_CALL (upstream commit 5e9a97b).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3077"
},
{
"category": "external",
"summary": "RHBZ#2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the i2c-ismt module from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from being loaded automatically.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2147572"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7 is not affected by this flaw as it did not include support for Intel Gen12 GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "RHBZ#2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2085300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "RHBZ#2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594"
}
],
"release_date": "2022-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
RHSA-2023:0334
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)\n\n* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Intel 9.2: Important iavf bug fixes (BZ#2127884)\n\n* vfio zero page mappings fail after 2M instances (BZ#2128514)\n\n* nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359)\n\n* ice: Driver Update to 5.19 (BZ#2132070)\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588)\n\n* drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619)\n\n* updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914)\n\n* DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213)\n\n* No signal showed in the VGA monitor when installing RHEL9 in the legacy bios mode (BZ#2140153)\n\n* Practically limit \"Dummy wait\" workaround to old Intel systems (BZ#2142168)\n\n* ppc64le: unexpected oom panic when there\u0027s enough memory left in zswap test (BZ#2143976)\n\n* fatal error: error in backend: Branch target out of insn range (BZ#2144902)\n\n* AMdCLIENT: The kernel command line parameter \"nomodeset\" not working properly (BZ#2145217)\n\n* Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910)\n\n* Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605)\n\n* DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0334",
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0334.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:42:18+00:00",
"generator": {
"date": "2025-10-09T22:42:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0334",
"initial_release_date": "2023-01-23T15:21:17+00:00",
"revision_history": [
{
"date": "2023-01-23T15:21:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-23T15:21:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.src",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-162.12.1.el9_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"product_id": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-162.12.1.el9_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.src",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.src",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.src",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-3077",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2123309"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. In particular, the userspace controllable \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and then used as the size of a memcpy, thus possibly writing beyond the end of dma_buffer. This flaw could allow a privileged local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for I2C_SMBUS_BLOCK_PROC_CALL (upstream commit 5e9a97b).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3077"
},
{
"category": "external",
"summary": "RHBZ#2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the i2c-ismt module from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from being loaded automatically.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-11-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2147572"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7 is not affected by this flaw as it did not include support for Intel Gen12 GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "RHBZ#2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2085300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "RHBZ#2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594"
}
],
"release_date": "2022-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
},
{
"cve": "CVE-2022-50053",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373553"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix reset error handling\n\nDo not call iavf_close in iavf_reset_task error handling. Doing so can\nlead to double call of napi_disable, which can lead to deadlock there.\nRemoving VF would lead to iavf_remove task being stuck, because it\nrequires crit_lock, which is held by iavf_close.\nCall iavf_disable_vf if reset fail, so that driver will clean up\nremaining invalid resources.\nDuring rapid VF resets, HW can fail to setup VF mailbox. Wrong\nerror handling can lead to iavf_remove being stuck with:\n[ 5218.999087] iavf 0000:82:01.0: Failed to init adminq: -53\n...\n[ 5267.189211] INFO: task repro.sh:11219 blocked for more than 30 seconds.\n[ 5267.189520] Tainted: G S E 5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.189764] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 5267.190062] task:repro.sh state:D stack: 0 pid:11219 ppid: 8162 flags:0x00000000\n[ 5267.190347] Call Trace:\n[ 5267.190647] \u003cTASK\u003e\n[ 5267.190927] __schedule+0x460/0x9f0\n[ 5267.191264] schedule+0x44/0xb0\n[ 5267.191563] schedule_preempt_disabled+0x14/0x20\n[ 5267.191890] __mutex_lock.isra.12+0x6e3/0xac0\n[ 5267.192237] ? iavf_remove+0xf9/0x6c0 [iavf]\n[ 5267.192565] iavf_remove+0x12a/0x6c0 [iavf]\n[ 5267.192911] ? _raw_spin_unlock_irqrestore+0x1e/0x40\n[ 5267.193285] pci_device_remove+0x36/0xb0\n[ 5267.193619] device_release_driver_internal+0xc1/0x150\n[ 5267.193974] pci_stop_bus_device+0x69/0x90\n[ 5267.194361] pci_stop_and_remove_bus_device+0xe/0x20\n[ 5267.194735] pci_iov_remove_virtfn+0xba/0x120\n[ 5267.195130] sriov_disable+0x2f/0xe0\n[ 5267.195506] ice_free_vfs+0x7d/0x2f0 [ice]\n[ 5267.196056] ? pci_get_device+0x4f/0x70\n[ 5267.196496] ice_sriov_configure+0x78/0x1a0 [ice]\n[ 5267.196995] sriov_numvfs_store+0xfe/0x140\n[ 5267.197466] kernfs_fop_write_iter+0x12e/0x1c0\n[ 5267.197918] new_sync_write+0x10c/0x190\n[ 5267.198404] vfs_write+0x24e/0x2d0\n[ 5267.198886] ksys_write+0x5c/0xd0\n[ 5267.199367] do_syscall_64+0x3a/0x80\n[ 5267.199827] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n[ 5267.200317] RIP: 0033:0x7f5b381205c8\n[ 5267.200814] RSP: 002b:00007fff8c7e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 5267.201981] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f5b381205c8\n[ 5267.202620] RDX: 0000000000000002 RSI: 00005569420ee900 RDI: 0000000000000001\n[ 5267.203426] RBP: 00005569420ee900 R08: 000000000000000a R09: 00007f5b38180820\n[ 5267.204327] R10: 000000000000000a R11: 0000000000000246 R12: 00007f5b383c06e0\n[ 5267.205193] R13: 0000000000000002 R14: 00007f5b383bb880 R15: 0000000000000002\n[ 5267.206041] \u003c/TASK\u003e\n[ 5267.206970] Kernel panic - not syncing: hung_task: blocked tasks\n[ 5267.207809] CPU: 48 PID: 551 Comm: khungtaskd Kdump: loaded Tainted: G S E 5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.208726] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.11.0 11/02/2019\n[ 5267.209623] Call Trace:\n[ 5267.210569] \u003cTASK\u003e\n[ 5267.211480] dump_stack_lvl+0x33/0x42\n[ 5267.212472] panic+0x107/0x294\n[ 5267.213467] watchdog.cold.8+0xc/0xbb\n[ 5267.214413] ? proc_dohung_task_timeout_secs+0x30/0x30\n[ 5267.215511] kthread+0xf4/0x120\n[ 5267.216459] ? kthread_complete_and_exit+0x20/0x20\n[ 5267.217505] ret_from_fork+0x22/0x30\n[ 5267.218459] \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iavf: Fix reset error handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50053"
},
{
"category": "external",
"summary": "RHBZ#2373553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50053",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50053"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50053",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50053"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50053-9359@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50053-9359@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iavf: Fix reset error handling"
},
{
"cve": "CVE-2022-50054",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373531"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the iavf module in the Linux kernel. A NULL pointer dereference can be triggered due to improper error management, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iavf: Fix NULL pointer dereference in iavf_get_link_ksettings",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.6, 8.7, 9.1 and 9.2 via RHSA-2022:7110 [1], RHSA-2022:7683 [2], RHSA-2023:0334 [3] and RHSA-2023:2458 [4], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2022:7110\n\n[2]. https://access.redhat.com/errata/RHSA-2022:7683\n\n[3]. https://access.redhat.com/errata/RHSA-2023:0334\n\n[4]. https://access.redhat.com/errata/RHSA-2023:2458",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50054"
},
{
"category": "external",
"summary": "RHBZ#2373531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50054",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50054"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50054",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50054"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50054-a29e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50054-a29e@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iavf: Fix NULL pointer dereference in iavf_get_link_ksettings"
}
]
}
RHSA-2023:0348
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0348",
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0348.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:42:18+00:00",
"generator": {
"date": "2025-10-09T22:42:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0348",
"initial_release_date": "2023-01-23T15:30:24+00:00",
"revision_history": [
{
"date": "2023-01-23T15:30:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-23T15:30:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"product_id": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1@1-1.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"product_id": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1@1-1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"product_id": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debugsource@1-1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"product_id": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debuginfo@1-1.el9_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"product_id": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1@1-1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"product_id": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debugsource@1-1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"product_id": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debuginfo@1-1.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2147572"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7 is not affected by this flaw as it did not include support for Intel Gen12 GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "RHBZ#2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
RHSA-2023:0839
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0839",
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0839.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:42:25+00:00",
"generator": {
"date": "2025-10-09T22:42:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0839",
"initial_release_date": "2023-02-21T09:25:55+00:00",
"revision_history": [
{
"date": "2023-02-21T09:25:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-21T09:25:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"product_id": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1@1-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"product_id": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1@1-1.el8_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debugsource@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debuginfo@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1@1-1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debugsource@1-1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debuginfo@1-1.el8_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debugsource@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debuginfo@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"product_id": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1@1-1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"product_id": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debugsource@1-1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"product_id": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debuginfo@1-1.el8_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:25:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:25:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023:0839
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0839",
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0839.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:42:25+00:00",
"generator": {
"date": "2025-10-09T22:42:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0839",
"initial_release_date": "2023-02-21T09:25:55+00:00",
"revision_history": [
{
"date": "2023-02-21T09:25:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-21T09:25:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"product_id": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1@1-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"product_id": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1@1-1.el8_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debugsource@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debuginfo@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1@1-1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debugsource@1-1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debuginfo@1-1.el8_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debugsource@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debuginfo@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"product_id": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1@1-1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"product_id": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debugsource@1-1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"product_id": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debuginfo@1-1.el8_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:25:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:25:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023:0832
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586)\n\n* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592)\n\n* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580)\n\n* MEI support for Alder Lake-S (BZ#2141783)\n\n* Host Pod -\u003e Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959)\n\n* RHEL8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287)\n\n* Intel 8.7 Bug: OS doesn\u0027t boot when vmd and interrupt remapping are enabled (BZ#2149474)\n\n* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745)\n\n* RHEL8.4 - boot: Add secure boot trailer (BZ#2151530)\n\n* error 524 from seccomp(2) when trying to load filter (BZ#2152138)\n\n* Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734)\n\n* Connectivity issue with vDPA driver (BZ#2152912)\n\n* High Load average due to cfs cpu throttling (BZ#2153108)\n\n* The \"kernel BUG at mm/usercopy.c:103!\" from BZ 2041529 is back on rhel-8.5 (BZ#2153230)\n\n* RHEL8: tick storm on nohz (isolated) CPU cores (BZ#2153653)\n\n* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460)\n\n* Azure RHEL 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272)\n\n* Azure: VM Deployment Failures Patch Request (BZ#2155280)\n\n* Azure vPCI RHEL-8: add the support of multi-MSI (BZ#2155289)\n\n* MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437)\n\n* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797)\n\n* Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905)\n\n* RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922)\n\n* The \u0027date\u0027 command shows wrong time in nested KVM s390x guest (BZ#2158813)\n\n* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182)\n\n* (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221)\n\n* i40e/iavf: VF reset task fails \"Never saw reset\" with 5 second timeout per VF (BZ#2160460)\n\n* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0832",
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0832.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-28T19:33:32+00:00",
"generator": {
"date": "2025-10-28T19:33:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:0832",
"initial_release_date": "2023-02-21T09:26:03+00:00",
"revision_history": [
{
"date": "2023-02-21T09:26:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-21T09:26:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-28T19:33:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.src",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.src",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-425.13.1.el8_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"product_id": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-425.13.1.el8_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.src",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.src",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2873",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2022-08-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2119048"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an out-of-bounds vulnerability in i2c-ismt driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2873"
},
{
"category": "external",
"summary": "RHBZ#2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/",
"url": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/"
}
],
"release_date": "2022-07-29T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module i2c-ismt from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an out-of-bounds vulnerability in i2c-ismt driver"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
},
{
"cve": "CVE-2022-50235",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2025-09-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395362"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Protect against send buffer overflow in NFSv2 READDIR\n\nRestore the previous limit on the @count argument to prevent a\nbuffer overflow attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50235"
},
{
"category": "external",
"summary": "RHBZ#2395362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395362"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50235"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50235",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50235"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/T"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR"
},
{
"cve": "CVE-2022-50410",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396536"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Protect against send buffer overflow in NFSv2 READ\n\nSince before the git era, NFSD has conserved the number of pages\nheld by each nfsd thread by combining the RPC receive and send\nbuffers into a single array of pages. This works because there are\nno cases where an operation needs a large RPC Call message and a\nlarge RPC Reply at the same time.\n\nOnce an RPC Call has been received, svc_process() updates\nsvc_rqst::rq_res to describe the part of rq_pages that can be\nused for constructing the Reply. This means that the send buffer\n(rq_res) shrinks when the received RPC record containing the RPC\nCall is large.\n\nA client can force this shrinkage on TCP by sending a correctly-\nformed RPC Call header contained in an RPC record that is\nexcessively large. The full maximum payload size cannot be\nconstructed in that case.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A logic flaw in the NFSv2 server implementation could allow a remote NFS client to trigger a send-buffer overflow by sending a valid but excessively large RPC Call header, resulting in an oversized READ request exceeding the available response buffer. Successful exploitation could lead to memory corruption and potential denial of service (kernel crash).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50410"
},
{
"category": "external",
"summary": "RHBZ#2396536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50410",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50410"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/T"
}
],
"release_date": "2025-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READ"
},
{
"cve": "CVE-2022-50487",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401498"
}
],
"notes": [
{
"category": "description",
"text": "A buffer management flaw was found in the Linux kernel\u0027s NFS server implementation in the NFSv3 READDIR operation handling. \nA remote client can trigger this issue by crafting an RPC call with an oversized RPC record header, which forces the server to shrink its response buffer allocation. This causes the READDIR response construction to write beyond the available buffer space, resulting in a send buffer overflow that leads to memory corruption, denial of service via crash, or potential data integrity issues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NFSD optimizes memory usage by sharing the same page array for both receiving RPC calls and sending replies, since operations typically don\u0027t need large buffers simultaneously. When an RPC call arrives, the response buffer size is calculated based on remaining pages after accounting for the received data. A malicious client can send a correctly-formed but deliberately oversized RPC record containing a small actual RPC call. The NFSD thread processes this normally, but the response buffer (rq_res) is now constrained. When constructing a READDIR reply, which can be quite large, the encoder writes past the truncated buffer boundary into adjacent kernel memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50487"
},
{
"category": "external",
"summary": "RHBZ#2401498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50487"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR"
}
]
}
rhsa-2022_8974
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)\n\n* kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)\n\n* hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)\n\n* hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)\n\n* hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)\n\n* hw: cpu: AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)\n\n* hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)\n\n* hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-9.0.z5 Batch (BZ#2137580)\n\n* [DELL EMC 9.0-RT BUG] System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139864)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8974",
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8974.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T20:44:38+00:00",
"generator": {
"date": "2024-11-22T20:44:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:8974",
"initial_release_date": "2022-12-13T16:08:56+00:00",
"revision_history": [
{
"date": "2022-12-13T16:08:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-13T16:08:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T20:44:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"product": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"product_id": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.36.1.rt21.108.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Gaoning Pan",
"Yongkang Jia"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2069793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1158"
},
{
"category": "external",
"summary": "RHBZ#2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
"url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
}
],
"release_date": "2022-04-07T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084479"
}
],
"notes": [
{
"category": "description",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "RHBZ#2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
}
],
"release_date": "2022-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
},
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090237"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "RHBZ#2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090240"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "RHBZ#2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090241"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup in specific special register write operations for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "RHBZ#2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-23816",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23816"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2022-23825",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23825"
},
{
"category": "external",
"summary": "RHBZ#2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2115065"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. In certain processors with Intel\u0027s Enhanced Indirect Branch Restricted Speculation (eIBRS) capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer (RSB) prediction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "RHBZ#2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "RHSB-6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"
}
],
"release_date": "2022-08-09T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-28693",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: information disclosure via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "RHBZ#2107465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: information disclosure via local access"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-29900",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"Kaveh Razavi",
"Johannes Wikner"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-29901",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel(R) processors may potentially allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "RHBZ#2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2022:9082
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)\n\n* kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:9082",
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_9082.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:53:53+00:00",
"generator": {
"date": "2025-10-09T21:53:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:9082",
"initial_release_date": "2022-12-15T16:27:48+00:00",
"revision_history": [
{
"date": "2022-12-15T16:27:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-15T16:27:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-5.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-4.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-4.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-3.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1@1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-3.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debugsource@1-3.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debuginfo@1-3.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debugsource@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debuginfo@1-1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-3.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debugsource@1-3.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debuginfo@1-3.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debugsource@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debuginfo@1-1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Gaoning Pan",
"Yongkang Jia"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2069793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1158"
},
{
"category": "external",
"summary": "RHBZ#2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
"url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
}
],
"release_date": "2022-04-07T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084479"
}
],
"notes": [
{
"category": "description",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "RHBZ#2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
}
],
"release_date": "2022-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "workaround",
"details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
},
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023_0300
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)\n\n* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863)\n\n* kernel-rt: update RT source tree to the latest RHEL-9.1.z1 Batch (BZ#2141817)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0300",
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0300.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T20:48:57+00:00",
"generator": {
"date": "2024-11-22T20:48:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:0300",
"initial_release_date": "2023-01-23T15:23:35+00:00",
"revision_history": [
{
"date": "2023-01-23T15:23:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-23T15:23:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T20:48:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"product": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"product_id": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-162.12.1.rt21.175.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-3077",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2123309"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. In particular, the userspace controllable \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and then used as the size of a memcpy, thus possibly writing beyond the end of dma_buffer. This flaw could allow a privileged local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for I2C_SMBUS_BLOCK_PROC_CALL (upstream commit 5e9a97b).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3077"
},
{
"category": "external",
"summary": "RHBZ#2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the i2c-ismt module from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from being loaded automatically.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2147572"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7 is not affected by this flaw as it did not include support for Intel Gen12 GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "RHBZ#2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2085300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "RHBZ#2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594"
}
],
"release_date": "2022-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023_0334
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)\n\n* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Intel 9.2: Important iavf bug fixes (BZ#2127884)\n\n* vfio zero page mappings fail after 2M instances (BZ#2128514)\n\n* nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359)\n\n* ice: Driver Update to 5.19 (BZ#2132070)\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588)\n\n* drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619)\n\n* updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914)\n\n* DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213)\n\n* No signal showed in the VGA monitor when installing RHEL9 in the legacy bios mode (BZ#2140153)\n\n* Practically limit \"Dummy wait\" workaround to old Intel systems (BZ#2142168)\n\n* ppc64le: unexpected oom panic when there\u0027s enough memory left in zswap test (BZ#2143976)\n\n* fatal error: error in backend: Branch target out of insn range (BZ#2144902)\n\n* AMdCLIENT: The kernel command line parameter \"nomodeset\" not working properly (BZ#2145217)\n\n* Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910)\n\n* Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605)\n\n* DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0334",
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0334.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T20:49:10+00:00",
"generator": {
"date": "2024-11-22T20:49:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:0334",
"initial_release_date": "2023-01-23T15:21:17+00:00",
"revision_history": [
{
"date": "2023-01-23T15:21:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-23T15:21:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T20:49:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"product_id": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-162.12.1.el9_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-162.12.1.el9_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.src",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.src",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.src",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.src",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-3077",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2123309"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. In particular, the userspace controllable \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and then used as the size of a memcpy, thus possibly writing beyond the end of dma_buffer. This flaw could allow a privileged local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for I2C_SMBUS_BLOCK_PROC_CALL (upstream commit 5e9a97b).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3077"
},
{
"category": "external",
"summary": "RHBZ#2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the i2c-ismt module from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from being loaded automatically.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-11-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2147572"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7 is not affected by this flaw as it did not include support for Intel Gen12 GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "RHBZ#2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2085300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "RHBZ#2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594"
}
],
"release_date": "2022-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2022_8973
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)\n\n* kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)\n\n* hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)\n\n* hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)\n\n* hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)\n\n* hw: cpu: AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)\n\n* hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)\n\n* hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sched/pelt: Fix attach_entity_load_avg() corner case (BZ#2105360)\n\n* RHEL9[fleetwood][P9]:kdump fails to capture vmcore when crash is triggered while running forkoff. (BZ#2109144)\n\n* ISST-LTE:[P10 Everest] [5.14.0-70.9.1.el9_0.ppc64le] HPT:RHEL9.0:ecolp95: lpar crashed at __list_del_entry_valid+0x90/0x100 and LPM failed (BZ#2112823)\n\n* [rhel9] livepatch panic: RIP: 0010:0xffffffffc0e070c4 seq_read_iter+0x124/0x4b0 (BZ#2122625)\n\n* System crashes due to list_add double add at iwl_mvm_mac_wake_tx_queue+0x71 (BZ#2123315)\n\n* [Dell EMC 9.0 BUG] Any process performing I/O doesn\u0027t fail on degraded LVM RAID and IO process hangs (BZ#2126215)\n\n* [HPEMC RHEL 9.0 REGRESSION] net, e810, ice: not enough device MSI-X vectors (BZ#2126491)\n\n* RHEL9.0 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127874)\n\n* Enable check-kabi (BZ#2132372)\n\n* Add symbols to stablelist (BZ#2132373)\n\n* Update RHEL9.1 kabi tooling (BZ#2132380)\n\n* kABI: Prepare the MM subsystem for kABI lockdown (BZ#2133464)\n\n* [Dell Storage 9.1 BUG] NVME command hang during storage array node reboot (BZ#2133553)\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134589)\n\n* crypto/testmgr.c should not list dh, ecdh-nist-p256, ecdh-nist-p384 as .fips_allowed = 1 (BZ#2136523)\n\n* FIPS self-tests for RSA pkcs7 signature verification (BZ#2136552)\n\n* [ovs-tc] Bad length in dpctl/dump-flows (BZ#2137354)\n\n* [RHEL9] s_pf0vf2: hw csum failure for mlx5 (BZ#2137355)\n\n* kernel memory leak while freeing nested actions (BZ#2137356)\n\n* ovs: backports from upstream (BZ#2137358)\n\n* kernel should conform to FIPS-140-3 requirements (both parts) (BZ#2139095)\n\n* [DELL EMC 9.0-RT BUG] System is not booting into RT Kernel with perc12. (BZ#2139214)\n\n* Fix panic in nbd/004 test (BZ#2139535)\n\n* Nested KVM is not working on RHEL 8.6 with hardware error 0x7 (BZ#2140141)\n\n* [RHEL9] Practically limit \"Dummy wait\" workaround to old Intel systems (BZ#2142169)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8973",
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8973.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T20:44:48+00:00",
"generator": {
"date": "2024-11-22T20:44:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:8973",
"initial_release_date": "2022-12-13T16:09:28+00:00",
"revision_history": [
{
"date": "2022-12-13T16:09:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-13T16:09:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T20:44:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"product_id": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.36.1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.36.1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.src",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.src",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Gaoning Pan",
"Yongkang Jia"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2069793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1158"
},
{
"category": "external",
"summary": "RHBZ#2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
"url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
}
],
"release_date": "2022-04-07T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084479"
}
],
"notes": [
{
"category": "description",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "RHBZ#2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
}
],
"release_date": "2022-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
},
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090237"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "RHBZ#2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090240"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "RHBZ#2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090241"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup in specific special register write operations for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "RHBZ#2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-23816",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23816"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2022-23825",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23825"
},
{
"category": "external",
"summary": "RHBZ#2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2115065"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. In certain processors with Intel\u0027s Enhanced Indirect Branch Restricted Speculation (eIBRS) capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer (RSB) prediction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "RHBZ#2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "RHSB-6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"
}
],
"release_date": "2022-08-09T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-28693",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: information disclosure via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "RHBZ#2107465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: information disclosure via local access"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-29900",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"Kaveh Razavi",
"Johannes Wikner"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-29901",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel(R) processors may potentially allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "RHBZ#2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
RHSA-2023:0832
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586)\n\n* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592)\n\n* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580)\n\n* MEI support for Alder Lake-S (BZ#2141783)\n\n* Host Pod -\u003e Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959)\n\n* RHEL8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287)\n\n* Intel 8.7 Bug: OS doesn\u0027t boot when vmd and interrupt remapping are enabled (BZ#2149474)\n\n* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745)\n\n* RHEL8.4 - boot: Add secure boot trailer (BZ#2151530)\n\n* error 524 from seccomp(2) when trying to load filter (BZ#2152138)\n\n* Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734)\n\n* Connectivity issue with vDPA driver (BZ#2152912)\n\n* High Load average due to cfs cpu throttling (BZ#2153108)\n\n* The \"kernel BUG at mm/usercopy.c:103!\" from BZ 2041529 is back on rhel-8.5 (BZ#2153230)\n\n* RHEL8: tick storm on nohz (isolated) CPU cores (BZ#2153653)\n\n* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460)\n\n* Azure RHEL 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272)\n\n* Azure: VM Deployment Failures Patch Request (BZ#2155280)\n\n* Azure vPCI RHEL-8: add the support of multi-MSI (BZ#2155289)\n\n* MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437)\n\n* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797)\n\n* Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905)\n\n* RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922)\n\n* The \u0027date\u0027 command shows wrong time in nested KVM s390x guest (BZ#2158813)\n\n* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182)\n\n* (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221)\n\n* i40e/iavf: VF reset task fails \"Never saw reset\" with 5 second timeout per VF (BZ#2160460)\n\n* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0832",
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0832.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-28T19:33:32+00:00",
"generator": {
"date": "2025-10-28T19:33:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2023:0832",
"initial_release_date": "2023-02-21T09:26:03+00:00",
"revision_history": [
{
"date": "2023-02-21T09:26:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-21T09:26:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-28T19:33:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.src",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.src",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-425.13.1.el8_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"product_id": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-425.13.1.el8_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.src",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.src",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2873",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2022-08-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2119048"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an out-of-bounds vulnerability in i2c-ismt driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2873"
},
{
"category": "external",
"summary": "RHBZ#2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/",
"url": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/"
}
],
"release_date": "2022-07-29T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module i2c-ismt from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an out-of-bounds vulnerability in i2c-ismt driver"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
},
{
"cve": "CVE-2022-50235",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2025-09-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395362"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Protect against send buffer overflow in NFSv2 READDIR\n\nRestore the previous limit on the @count argument to prevent a\nbuffer overflow attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50235"
},
{
"category": "external",
"summary": "RHBZ#2395362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395362"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50235"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50235",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50235"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/T"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR"
},
{
"cve": "CVE-2022-50410",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396536"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Protect against send buffer overflow in NFSv2 READ\n\nSince before the git era, NFSD has conserved the number of pages\nheld by each nfsd thread by combining the RPC receive and send\nbuffers into a single array of pages. This works because there are\nno cases where an operation needs a large RPC Call message and a\nlarge RPC Reply at the same time.\n\nOnce an RPC Call has been received, svc_process() updates\nsvc_rqst::rq_res to describe the part of rq_pages that can be\nused for constructing the Reply. This means that the send buffer\n(rq_res) shrinks when the received RPC record containing the RPC\nCall is large.\n\nA client can force this shrinkage on TCP by sending a correctly-\nformed RPC Call header contained in an RPC record that is\nexcessively large. The full maximum payload size cannot be\nconstructed in that case.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A logic flaw in the NFSv2 server implementation could allow a remote NFS client to trigger a send-buffer overflow by sending a valid but excessively large RPC Call header, resulting in an oversized READ request exceeding the available response buffer. Successful exploitation could lead to memory corruption and potential denial of service (kernel crash).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50410"
},
{
"category": "external",
"summary": "RHBZ#2396536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50410",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50410"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/T"
}
],
"release_date": "2025-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READ"
},
{
"cve": "CVE-2022-50487",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401498"
}
],
"notes": [
{
"category": "description",
"text": "A buffer management flaw was found in the Linux kernel\u0027s NFS server implementation in the NFSv3 READDIR operation handling. \nA remote client can trigger this issue by crafting an RPC call with an oversized RPC record header, which forces the server to shrink its response buffer allocation. This causes the READDIR response construction to write beyond the available buffer space, resulting in a send buffer overflow that leads to memory corruption, denial of service via crash, or potential data integrity issues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NFSD optimizes memory usage by sharing the same page array for both receiving RPC calls and sending replies, since operations typically don\u0027t need large buffers simultaneously. When an RPC call arrives, the response buffer size is calculated based on remaining pages after accounting for the received data. A malicious client can send a correctly-formed but deliberately oversized RPC record containing a small actual RPC call. The NFSD thread processes this normally, but the response buffer (rq_res) is now constrained. When constructing a READDIR reply, which can be quite large, the encoder writes past the truncated buffer boundary into adjacent kernel memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50487"
},
{
"category": "external",
"summary": "RHBZ#2401498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50487"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR"
}
]
}
rhsa-2023:0348
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0348",
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0348.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:42:18+00:00",
"generator": {
"date": "2025-10-09T22:42:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0348",
"initial_release_date": "2023-01-23T15:30:24+00:00",
"revision_history": [
{
"date": "2023-01-23T15:30:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-23T15:30:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"product_id": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1@1-1.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"product_id": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1@1-1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"product_id": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debugsource@1-1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"product_id": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debuginfo@1-1.el9_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"product_id": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1@1-1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"product_id": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debugsource@1-1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"product_id": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debuginfo@1-1.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2147572"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7 is not affected by this flaw as it did not include support for Intel Gen12 GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "RHBZ#2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
RHSA-2022:8974
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)\n\n* kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)\n\n* hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)\n\n* hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)\n\n* hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)\n\n* hw: cpu: AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)\n\n* hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)\n\n* hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-9.0.z5 Batch (BZ#2137580)\n\n* [DELL EMC 9.0-RT BUG] System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139864)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8974",
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8974.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:53:52+00:00",
"generator": {
"date": "2025-10-09T21:53:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:8974",
"initial_release_date": "2022-12-13T16:08:56+00:00",
"revision_history": [
{
"date": "2022-12-13T16:08:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-13T16:08:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"product": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"product_id": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.36.1.rt21.108.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Gaoning Pan",
"Yongkang Jia"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2069793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1158"
},
{
"category": "external",
"summary": "RHBZ#2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
"url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
}
],
"release_date": "2022-04-07T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084479"
}
],
"notes": [
{
"category": "description",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "RHBZ#2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
}
],
"release_date": "2022-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
},
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090237"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "RHBZ#2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090240"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "RHBZ#2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090241"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup in specific special register write operations for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "RHBZ#2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-23816",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23816"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2022-23825",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23825"
},
{
"category": "external",
"summary": "RHBZ#2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2115065"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. In certain processors with Intel\u0027s Enhanced Indirect Branch Restricted Speculation (eIBRS) capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer (RSB) prediction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "RHBZ#2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "RHSB-6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"
}
],
"release_date": "2022-08-09T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-28693",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: information disclosure via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "RHBZ#2107465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: information disclosure via local access"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-29900",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"Kaveh Razavi",
"Johannes Wikner"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-29901",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel(R) processors may potentially allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "RHBZ#2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023_0832
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586)\n\n* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592)\n\n* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580)\n\n* MEI support for Alder Lake-S (BZ#2141783)\n\n* Host Pod -\u003e Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959)\n\n* RHEL8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287)\n\n* Intel 8.7 Bug: OS doesn\u0027t boot when vmd and interrupt remapping are enabled (BZ#2149474)\n\n* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745)\n\n* RHEL8.4 - boot: Add secure boot trailer (BZ#2151530)\n\n* error 524 from seccomp(2) when trying to load filter (BZ#2152138)\n\n* Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734)\n\n* Connectivity issue with vDPA driver (BZ#2152912)\n\n* High Load average due to cfs cpu throttling (BZ#2153108)\n\n* The \"kernel BUG at mm/usercopy.c:103!\" from BZ 2041529 is back on rhel-8.5 (BZ#2153230)\n\n* RHEL8: tick storm on nohz (isolated) CPU cores (BZ#2153653)\n\n* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460)\n\n* Azure RHEL 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272)\n\n* Azure: VM Deployment Failures Patch Request (BZ#2155280)\n\n* Azure vPCI RHEL-8: add the support of multi-MSI (BZ#2155289)\n\n* MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437)\n\n* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797)\n\n* Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905)\n\n* RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922)\n\n* The \u0027date\u0027 command shows wrong time in nested KVM s390x guest (BZ#2158813)\n\n* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182)\n\n* (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221)\n\n* i40e/iavf: VF reset task fails \"Never saw reset\" with 5 second timeout per VF (BZ#2160460)\n\n* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0832",
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0832.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T13:23:53+00:00",
"generator": {
"date": "2024-11-15T13:23:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:0832",
"initial_release_date": "2023-02-21T09:26:03+00:00",
"revision_history": [
{
"date": "2023-02-21T09:26:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-21T09:26:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T13:23:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-425.13.1.el8_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-425.13.1.el8_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-425.13.1.el8_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-425.13.1.el8_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-425.13.1.el8_7.src",
"product": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.src",
"product_id": "kernel-0:4.18.0-425.13.1.el8_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-425.13.1.el8_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-425.13.1.el8_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"product_id": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-425.13.1.el8_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.src",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.src",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"relates_to_product_reference": "CRB-8.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2873",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2022-08-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2119048"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an out-of-bounds vulnerability in i2c-ismt driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2873"
},
{
"category": "external",
"summary": "RHBZ#2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/",
"url": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/"
}
],
"release_date": "2022-07-29T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module i2c-ismt from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an out-of-bounds vulnerability in i2c-ismt driver"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-headers-0:4.18.0-425.13.1.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:26:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"BaseOS-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.src",
"CRB-8.7.0.Z.MAIN:kernel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-abi-stablelists-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-cross-headers-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-core-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-doc-0:4.18.0-425.13.1.el8_7.noarch",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-modules-extra-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-0:4.18.0-425.13.1.el8_7.x86_64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.aarch64",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.ppc64le",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.s390x",
"CRB-8.7.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-425.13.1.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2022_9082
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)\n\n* kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:9082",
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_9082.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-22T20:44:58+00:00",
"generator": {
"date": "2024-11-22T20:44:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:9082",
"initial_release_date": "2022-12-15T16:27:48+00:00",
"revision_history": [
{
"date": "2022-12-15T16:27:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-15T16:27:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T20:44:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-5.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-4.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-4.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-3.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1@1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-3.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debugsource@1-3.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debuginfo@1-3.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debugsource@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debuginfo@1-1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-3.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debugsource@1-3.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debuginfo@1-3.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debugsource@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debuginfo@1-1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Gaoning Pan",
"Yongkang Jia"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2069793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1158"
},
{
"category": "external",
"summary": "RHBZ#2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
"url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
}
],
"release_date": "2022-04-07T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084479"
}
],
"notes": [
{
"category": "description",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "RHBZ#2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
}
],
"release_date": "2022-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "workaround",
"details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
},
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023_0348
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0348",
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0348.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-22T20:45:26+00:00",
"generator": {
"date": "2024-11-22T20:45:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:0348",
"initial_release_date": "2023-01-23T15:30:24+00:00",
"revision_history": [
{
"date": "2023-01-23T15:30:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-23T15:30:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T20:45:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"product_id": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1@1-1.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"product_id": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1@1-1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"product_id": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debugsource@1-1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"product_id": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debuginfo@1-1.el9_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"product_id": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1@1-1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"product_id": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debugsource@1-1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"product_id": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-162_6_1-debuginfo@1-1.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2147572"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7 is not affected by this flaw as it did not include support for Intel Gen12 GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "RHBZ#2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:30:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debuginfo-0:1-1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kpatch-patch-5_14_0-162_6_1-debugsource-0:1-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
RHSA-2023:0854
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8-RT: Backport use of a dedicate thread for timer wakeups (BZ#2127204)\n\n* SNO Crashed twice - kernel BUG at lib/list_debug.c:28 (BZ#2132062)\n\n* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel [RT-8] (BZ#2139851)\n\n* scheduling while atomic in fpu_clone() -\u003e fpu_inherit_perms() (BZ#2154469)\n\n* The latest RHEL 8.7.z2 kernel changes need to be merged into the RT source tree to keep source parity between the two kernels. (BZ#2159806)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0854",
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0854.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:42:26+00:00",
"generator": {
"date": "2025-10-09T22:42:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0854",
"initial_release_date": "2023-02-21T09:01:40+00:00",
"revision_history": [
{
"date": "2023-02-21T09:01:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-21T09:01:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"product": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"product_id": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-425.13.1.rt7.223.el8_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2873",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2022-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2119048"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an out-of-bounds vulnerability in i2c-ismt driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2873"
},
{
"category": "external",
"summary": "RHBZ#2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/",
"url": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/"
}
],
"release_date": "2022-07-29T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:01:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module i2c-ismt from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an out-of-bounds vulnerability in i2c-ismt driver"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:01:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:01:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023_0854
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8-RT: Backport use of a dedicate thread for timer wakeups (BZ#2127204)\n\n* SNO Crashed twice - kernel BUG at lib/list_debug.c:28 (BZ#2132062)\n\n* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel [RT-8] (BZ#2139851)\n\n* scheduling while atomic in fpu_clone() -\u003e fpu_inherit_perms() (BZ#2154469)\n\n* The latest RHEL 8.7.z2 kernel changes need to be merged into the RT source tree to keep source parity between the two kernels. (BZ#2159806)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0854",
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0854.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T13:24:02+00:00",
"generator": {
"date": "2024-11-15T13:24:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:0854",
"initial_release_date": "2023-02-21T09:01:40+00:00",
"revision_history": [
{
"date": "2023-02-21T09:01:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-21T09:01:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T13:24:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"product": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"product_id": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-425.13.1.rt7.223.el8_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2873",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2022-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2119048"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an out-of-bounds vulnerability in i2c-ismt driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2873"
},
{
"category": "external",
"summary": "RHBZ#2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/",
"url": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/"
}
],
"release_date": "2022-07-29T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:01:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module i2c-ismt from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an out-of-bounds vulnerability in i2c-ismt driver"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:01:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:01:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023:0334
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)\n\n* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Intel 9.2: Important iavf bug fixes (BZ#2127884)\n\n* vfio zero page mappings fail after 2M instances (BZ#2128514)\n\n* nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359)\n\n* ice: Driver Update to 5.19 (BZ#2132070)\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588)\n\n* drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619)\n\n* updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914)\n\n* DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213)\n\n* No signal showed in the VGA monitor when installing RHEL9 in the legacy bios mode (BZ#2140153)\n\n* Practically limit \"Dummy wait\" workaround to old Intel systems (BZ#2142168)\n\n* ppc64le: unexpected oom panic when there\u0027s enough memory left in zswap test (BZ#2143976)\n\n* fatal error: error in backend: Branch target out of insn range (BZ#2144902)\n\n* AMdCLIENT: The kernel command line parameter \"nomodeset\" not working properly (BZ#2145217)\n\n* Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910)\n\n* Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605)\n\n* DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0334",
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0334.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:42:18+00:00",
"generator": {
"date": "2025-10-09T22:42:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0334",
"initial_release_date": "2023-01-23T15:21:17+00:00",
"revision_history": [
{
"date": "2023-01-23T15:21:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-23T15:21:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"product": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_id": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-162.12.1.el9_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-162.12.1.el9_1.src",
"product": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src",
"product_id": "kernel-0:5.14.0-162.12.1.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-162.12.1.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-162.12.1.el9_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"product_id": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-162.12.1.el9_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.src",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.src",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.src",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-3077",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2123309"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. In particular, the userspace controllable \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and then used as the size of a memcpy, thus possibly writing beyond the end of dma_buffer. This flaw could allow a privileged local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for I2C_SMBUS_BLOCK_PROC_CALL (upstream commit 5e9a97b).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3077"
},
{
"category": "external",
"summary": "RHBZ#2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the i2c-ismt module from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from being loaded automatically.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-11-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2147572"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7 is not affected by this flaw as it did not include support for Intel Gen12 GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "RHBZ#2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2085300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "RHBZ#2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594"
}
],
"release_date": "2022-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"known_not_affected": [
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
},
{
"cve": "CVE-2022-50053",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373553"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix reset error handling\n\nDo not call iavf_close in iavf_reset_task error handling. Doing so can\nlead to double call of napi_disable, which can lead to deadlock there.\nRemoving VF would lead to iavf_remove task being stuck, because it\nrequires crit_lock, which is held by iavf_close.\nCall iavf_disable_vf if reset fail, so that driver will clean up\nremaining invalid resources.\nDuring rapid VF resets, HW can fail to setup VF mailbox. Wrong\nerror handling can lead to iavf_remove being stuck with:\n[ 5218.999087] iavf 0000:82:01.0: Failed to init adminq: -53\n...\n[ 5267.189211] INFO: task repro.sh:11219 blocked for more than 30 seconds.\n[ 5267.189520] Tainted: G S E 5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.189764] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 5267.190062] task:repro.sh state:D stack: 0 pid:11219 ppid: 8162 flags:0x00000000\n[ 5267.190347] Call Trace:\n[ 5267.190647] \u003cTASK\u003e\n[ 5267.190927] __schedule+0x460/0x9f0\n[ 5267.191264] schedule+0x44/0xb0\n[ 5267.191563] schedule_preempt_disabled+0x14/0x20\n[ 5267.191890] __mutex_lock.isra.12+0x6e3/0xac0\n[ 5267.192237] ? iavf_remove+0xf9/0x6c0 [iavf]\n[ 5267.192565] iavf_remove+0x12a/0x6c0 [iavf]\n[ 5267.192911] ? _raw_spin_unlock_irqrestore+0x1e/0x40\n[ 5267.193285] pci_device_remove+0x36/0xb0\n[ 5267.193619] device_release_driver_internal+0xc1/0x150\n[ 5267.193974] pci_stop_bus_device+0x69/0x90\n[ 5267.194361] pci_stop_and_remove_bus_device+0xe/0x20\n[ 5267.194735] pci_iov_remove_virtfn+0xba/0x120\n[ 5267.195130] sriov_disable+0x2f/0xe0\n[ 5267.195506] ice_free_vfs+0x7d/0x2f0 [ice]\n[ 5267.196056] ? pci_get_device+0x4f/0x70\n[ 5267.196496] ice_sriov_configure+0x78/0x1a0 [ice]\n[ 5267.196995] sriov_numvfs_store+0xfe/0x140\n[ 5267.197466] kernfs_fop_write_iter+0x12e/0x1c0\n[ 5267.197918] new_sync_write+0x10c/0x190\n[ 5267.198404] vfs_write+0x24e/0x2d0\n[ 5267.198886] ksys_write+0x5c/0xd0\n[ 5267.199367] do_syscall_64+0x3a/0x80\n[ 5267.199827] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n[ 5267.200317] RIP: 0033:0x7f5b381205c8\n[ 5267.200814] RSP: 002b:00007fff8c7e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 5267.201981] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f5b381205c8\n[ 5267.202620] RDX: 0000000000000002 RSI: 00005569420ee900 RDI: 0000000000000001\n[ 5267.203426] RBP: 00005569420ee900 R08: 000000000000000a R09: 00007f5b38180820\n[ 5267.204327] R10: 000000000000000a R11: 0000000000000246 R12: 00007f5b383c06e0\n[ 5267.205193] R13: 0000000000000002 R14: 00007f5b383bb880 R15: 0000000000000002\n[ 5267.206041] \u003c/TASK\u003e\n[ 5267.206970] Kernel panic - not syncing: hung_task: blocked tasks\n[ 5267.207809] CPU: 48 PID: 551 Comm: khungtaskd Kdump: loaded Tainted: G S E 5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.208726] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.11.0 11/02/2019\n[ 5267.209623] Call Trace:\n[ 5267.210569] \u003cTASK\u003e\n[ 5267.211480] dump_stack_lvl+0x33/0x42\n[ 5267.212472] panic+0x107/0x294\n[ 5267.213467] watchdog.cold.8+0xc/0xbb\n[ 5267.214413] ? proc_dohung_task_timeout_secs+0x30/0x30\n[ 5267.215511] kthread+0xf4/0x120\n[ 5267.216459] ? kthread_complete_and_exit+0x20/0x20\n[ 5267.217505] ret_from_fork+0x22/0x30\n[ 5267.218459] \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iavf: Fix reset error handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50053"
},
{
"category": "external",
"summary": "RHBZ#2373553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50053",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50053"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50053",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50053"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50053-9359@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50053-9359@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iavf: Fix reset error handling"
},
{
"cve": "CVE-2022-50054",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373531"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the iavf module in the Linux kernel. A NULL pointer dereference can be triggered due to improper error management, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iavf: Fix NULL pointer dereference in iavf_get_link_ksettings",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.6, 8.7, 9.1 and 9.2 via RHSA-2022:7110 [1], RHSA-2022:7683 [2], RHSA-2023:0334 [3] and RHSA-2023:2458 [4], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2022:7110\n\n[2]. https://access.redhat.com/errata/RHSA-2022:7683\n\n[3]. https://access.redhat.com/errata/RHSA-2023:0334\n\n[4]. https://access.redhat.com/errata/RHSA-2023:2458",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50054"
},
{
"category": "external",
"summary": "RHBZ#2373531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50054",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50054"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50054",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50054"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50054-a29e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50054-a29e@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:21:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:bpftool-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.src",
"CRB-9.1.0.Z.MAIN:kernel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-abi-stablelists-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-cross-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-core-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debug-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-s390x-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-devel-matched-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-doc-0:5.14.0-162.12.1.el9_1.noarch",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-headers-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-modules-extra-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-tools-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:kernel-tools-libs-devel-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-core-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-devel-matched-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-0:5.14.0-162.12.1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:python3-perf-debuginfo-0:5.14.0-162.12.1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iavf: Fix NULL pointer dereference in iavf_get_link_ksettings"
}
]
}
RHSA-2022:9082
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)\n\n* kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:9082",
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_9082.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T21:53:53+00:00",
"generator": {
"date": "2025-10-09T21:53:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:9082",
"initial_release_date": "2022-12-15T16:27:48+00:00",
"revision_history": [
{
"date": "2022-12-15T16:27:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-15T16:27:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-5.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-4.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-4.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-3.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1@1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-5.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-4.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-3.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debugsource@1-3.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debuginfo@1-3.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debugsource@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debuginfo@1-1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-5.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-4.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-3.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debugsource@1-3.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debuginfo@1-3.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debugsource@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_30_1-debuginfo@1-1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Gaoning Pan",
"Yongkang Jia"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2069793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1158"
},
{
"category": "external",
"summary": "RHBZ#2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
"url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
}
],
"release_date": "2022-04-07T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084479"
}
],
"notes": [
{
"category": "description",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "RHBZ#2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
}
],
"release_date": "2022-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "workaround",
"details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
},
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-15T16:27:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-5.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-4.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-3.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kpatch-patch-5_14_0-70_30_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023_0839
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0839",
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0839.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T13:24:12+00:00",
"generator": {
"date": "2024-11-15T13:24:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:0839",
"initial_release_date": "2023-02-21T09:25:55+00:00",
"revision_history": [
{
"date": "2023-02-21T09:25:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-21T09:25:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T13:24:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"product_id": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1@1-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"product_id": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1@1-1.el8_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debugsource@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debuginfo@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1@1-1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debugsource@1-1.el8_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"product_id": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debuginfo@1-1.el8_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debugsource@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_3_1-debuginfo@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"product_id": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1@1-1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"product_id": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debugsource@1-1.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"product_id": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-425_10_1-debuginfo@1-1.el8_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:25:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:25:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debuginfo-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_10_1-debugsource-0:1-1.el8_7.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.src",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.7.0.Z.MAIN:kpatch-patch-4_18_0-425_3_1-debugsource-0:1-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
RHSA-2023:0300
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)\n\n* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863)\n\n* kernel-rt: update RT source tree to the latest RHEL-9.1.z1 Batch (BZ#2141817)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0300",
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0300.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:42:17+00:00",
"generator": {
"date": "2025-10-09T22:42:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0300",
"initial_release_date": "2023-01-23T15:23:35+00:00",
"revision_history": [
{
"date": "2023-01-23T15:23:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-01-23T15:23:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"product": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"product_id": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-162.12.1.rt21.175.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-162.12.1.rt21.175.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "NFV-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"relates_to_product_reference": "RT-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-3077",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2123309"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. In particular, the userspace controllable \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and then used as the size of a memcpy, thus possibly writing beyond the end of dma_buffer. This flaw could allow a privileged local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for I2C_SMBUS_BLOCK_PROC_CALL (upstream commit 5e9a97b).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3077"
},
{
"category": "external",
"summary": "RHBZ#2123309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the i2c-ismt module from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from being loaded automatically.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i2c: unbounded length leads to buffer overflow in ismt_access()"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2147572"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 7 is not affected by this flaw as it did not include support for Intel Gen12 GPU.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "RHBZ#2147572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1"
}
],
"release_date": "2022-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: i915: Incorrect GPU TLB flush can lead to random memory access"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2085300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "RHBZ#2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594"
}
],
"release_date": "2022-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "workaround",
"details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-01-23T15:23:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"NFV-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"NFV-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.src",
"RT-9.1.0.Z.MAIN:kernel-rt-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-core-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debug-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-devel-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-kvm-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64",
"RT-9.1.0.Z.MAIN:kernel-rt-modules-extra-0:5.14.0-162.12.1.rt21.175.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
RHSA-2022:8973
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)\n\n* kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)\n\n* hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)\n\n* hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)\n\n* hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)\n\n* hw: cpu: AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)\n\n* hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)\n\n* hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sched/pelt: Fix attach_entity_load_avg() corner case (BZ#2105360)\n\n* RHEL9[fleetwood][P9]:kdump fails to capture vmcore when crash is triggered while running forkoff. (BZ#2109144)\n\n* ISST-LTE:[P10 Everest] [5.14.0-70.9.1.el9_0.ppc64le] HPT:RHEL9.0:ecolp95: lpar crashed at __list_del_entry_valid+0x90/0x100 and LPM failed (BZ#2112823)\n\n* [rhel9] livepatch panic: RIP: 0010:0xffffffffc0e070c4 seq_read_iter+0x124/0x4b0 (BZ#2122625)\n\n* System crashes due to list_add double add at iwl_mvm_mac_wake_tx_queue+0x71 (BZ#2123315)\n\n* [Dell EMC 9.0 BUG] Any process performing I/O doesn\u0027t fail on degraded LVM RAID and IO process hangs (BZ#2126215)\n\n* [HPEMC RHEL 9.0 REGRESSION] net, e810, ice: not enough device MSI-X vectors (BZ#2126491)\n\n* RHEL9.0 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127874)\n\n* Enable check-kabi (BZ#2132372)\n\n* Add symbols to stablelist (BZ#2132373)\n\n* Update RHEL9.1 kabi tooling (BZ#2132380)\n\n* kABI: Prepare the MM subsystem for kABI lockdown (BZ#2133464)\n\n* [Dell Storage 9.1 BUG] NVME command hang during storage array node reboot (BZ#2133553)\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134589)\n\n* crypto/testmgr.c should not list dh, ecdh-nist-p256, ecdh-nist-p384 as .fips_allowed = 1 (BZ#2136523)\n\n* FIPS self-tests for RSA pkcs7 signature verification (BZ#2136552)\n\n* [ovs-tc] Bad length in dpctl/dump-flows (BZ#2137354)\n\n* [RHEL9] s_pf0vf2: hw csum failure for mlx5 (BZ#2137355)\n\n* kernel memory leak while freeing nested actions (BZ#2137356)\n\n* ovs: backports from upstream (BZ#2137358)\n\n* kernel should conform to FIPS-140-3 requirements (both parts) (BZ#2139095)\n\n* [DELL EMC 9.0-RT BUG] System is not booting into RT Kernel with perc12. (BZ#2139214)\n\n* Fix panic in nbd/004 test (BZ#2139535)\n\n* Nested KVM is not working on RHEL 8.6 with hardware error 0x7 (BZ#2140141)\n\n* [RHEL9] Practically limit \"Dummy wait\" workaround to old Intel systems (BZ#2142169)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8973",
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8973.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-23T12:14:44+00:00",
"generator": {
"date": "2025-10-23T12:14:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:8973",
"initial_release_date": "2022-12-13T16:09:28+00:00",
"revision_history": [
{
"date": "2022-12-13T16:09:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-13T16:09:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T12:14:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.36.1.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.36.1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.36.1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.36.1.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"product_id": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.36.1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.36.1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.36.1.el9_0.src",
"product": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src",
"product_id": "kernel-0:5.14.0-70.36.1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.36.1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.src",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Gaoning Pan",
"Yongkang Jia"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2069793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1158"
},
{
"category": "external",
"summary": "RHBZ#2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
"url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
}
],
"release_date": "2022-04-07T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084479"
}
],
"notes": [
{
"category": "description",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "RHBZ#2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
}
],
"release_date": "2022-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
},
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090237"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "RHBZ#2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090240"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "RHBZ#2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090241"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup in specific special register write operations for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "RHBZ#2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-23816",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23816"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2022-23825",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23825"
},
{
"category": "external",
"summary": "RHBZ#2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2115065"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. In certain processors with Intel\u0027s Enhanced Indirect Branch Restricted Speculation (eIBRS) capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer (RSB) prediction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "RHBZ#2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "RHSB-6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"
}
],
"release_date": "2022-08-09T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-28693",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: information disclosure via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "RHBZ#2107465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: information disclosure via local access"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-29900",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"Kaveh Razavi",
"Johannes Wikner"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-29901",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel(R) processors may potentially allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "RHBZ#2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
},
{
"cve": "CVE-2022-49086",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347770"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open vSwitch module in the Linux kernel. Improper handling of allocated memory can lead to a memory leak, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: openvswitch: fix leak of nested actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.4, 8.7, 9.0 and 9.1 via RHSA-2022:5626 [1], RHSA-2022:7683 [2], RHSA-2022:8973 [3] and RHSA-2022:8267 [4], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2022:5626\n\n[2]. https://access.redhat.com/errata/RHSA-2022:7683\n\n[3]. https://access.redhat.com/errata/RHSA-2022:8973\n\n[4]. https://access.redhat.com/errata/RHSA-2022:8267",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49086"
},
{
"category": "external",
"summary": "RHBZ#2347770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347770"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49086"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: openvswitch: fix leak of nested actions"
},
{
"cve": "CVE-2022-49611",
"cwe": {
"id": "CWE-1037",
"name": "Processor Optimization Removal or Modification of Security-critical Code"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348077"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/speculation: Fill RSB on vmexit for IBRS\n\nPrevent RSB underflow/poisoning attacks with RSB. While at it, add a\nbunch of comments to attempt to document the current state of tribal\nknowledge about RSB attacks and what exactly is being mitigated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/speculation: Fill RSB on vmexit for IBRS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49611"
},
{
"category": "external",
"summary": "RHBZ#2348077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348077"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49611",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49611"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:09:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"AppStream-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"BaseOS-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"BaseOS-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:bpftool-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.src",
"CRB-9.0.0.Z.EUS:kernel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-abi-stablelists-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-cross-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-core-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debug-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-devel-matched-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-doc-0:5.14.0-70.36.1.el9_0.noarch",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-headers-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-modules-extra-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-tools-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:kernel-tools-libs-devel-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-core-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-0:5.14.0-70.36.1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:python3-perf-debuginfo-0:5.14.0-70.36.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: x86/speculation: Fill RSB on vmexit for IBRS"
}
]
}
rhsa-2022:8974
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)\n\n* kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)\n\n* hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)\n\n* hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)\n\n* hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)\n\n* hw: cpu: AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)\n\n* hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)\n\n* hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-9.0.z5 Batch (BZ#2137580)\n\n* [DELL EMC 9.0-RT BUG] System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139864)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8974",
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8974.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:53:52+00:00",
"generator": {
"date": "2025-10-09T21:53:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:8974",
"initial_release_date": "2022-12-13T16:08:56+00:00",
"revision_history": [
{
"date": "2022-12-13T16:08:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-12-13T16:08:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"product": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"product_id": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.36.1.rt21.108.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.36.1.rt21.108.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0)",
"product_id": "NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v.9.0)",
"product_id": "RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Gaoning Pan",
"Yongkang Jia"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2069793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1158"
},
{
"category": "external",
"summary": "RHBZ#2069793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
"url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
}
],
"release_date": "2022-04-07T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084479"
}
],
"notes": [
{
"category": "description",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "RHBZ#2084479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
}
],
"release_date": "2022-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
},
{
"acknowledgments": [
{
"names": [
"Selim Enes Karaduman"
],
"organization": "Enesdex"
}
],
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103681"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in the pipe_resize_ring(). The race condition occurs when a thread uses ioctl(IOC_WATCH_QUEUE_SET_SIZE) to resize the pipe buffer and free the old pipe buffer, while another thread uses keyctl() to trigger a notification in the watch queue, calling post_one_notification() and accessing the freed pipe buffer. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watch queue race condition can lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for general notification queue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "RHBZ#2103681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1165/"
}
],
"release_date": "2022-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: watch queue race condition can lead to privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090237"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "RHBZ#2090237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090240"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "RHBZ#2090240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090241"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Incomplete cleanup in specific special register write operations for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "RHBZ#2090241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
}
],
"release_date": "2022-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-23816",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23816"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2022-23825",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23825"
},
{
"category": "external",
"summary": "RHBZ#2103153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2115065"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. In certain processors with Intel\u0027s Enhanced Indirect Branch Restricted Speculation (eIBRS) capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer (RSB) prediction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "RHBZ#2115065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
},
{
"category": "external",
"summary": "RHSB-6971358",
"url": "https://access.redhat.com/solutions/6971358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"
}
],
"release_date": "2022-08-09T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-28693",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2107465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: information disclosure via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "RHBZ#2107465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: information disclosure via local access"
},
{
"acknowledgments": [
{
"names": [
"Johannes Wikner",
"Kaveh Razavi"
],
"organization": "ETH Z\u00fcrich"
}
],
"cve": "CVE-2022-29900",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090226"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "RHBZ#2090226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"acknowledgments": [
{
"names": [
"Kaveh Razavi",
"Johannes Wikner"
],
"organization": "ETH Zurich"
}
],
"cve": "CVE-2022-29901",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-05-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103148"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel(R) processors may potentially allow an authorized user to enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "RHBZ#2103148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-12-13T16:08:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"NFV-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"NFV-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.src",
"RT-9.0.0.Z.EUS:kernel-rt-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-core-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-devel-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-kvm-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64",
"RT-9.0.0.Z.EUS:kernel-rt-modules-extra-0:5.14.0-70.36.1.rt21.108.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
rhsa-2023:0854
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)\n\n* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8-RT: Backport use of a dedicate thread for timer wakeups (BZ#2127204)\n\n* SNO Crashed twice - kernel BUG at lib/list_debug.c:28 (BZ#2132062)\n\n* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel [RT-8] (BZ#2139851)\n\n* scheduling while atomic in fpu_clone() -\u003e fpu_inherit_perms() (BZ#2154469)\n\n* The latest RHEL 8.7.z2 kernel changes need to be merged into the RT source tree to keep source parity between the two kernels. (BZ#2159806)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0854",
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0854.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:42:26+00:00",
"generator": {
"date": "2025-10-09T22:42:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:0854",
"initial_release_date": "2023-02-21T09:01:40+00:00",
"revision_history": [
{
"date": "2023-02-21T09:01:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-21T09:01:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"product": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"product_id": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-425.13.1.rt7.223.el8_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-425.13.1.rt7.223.el8_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "NFV-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 8)",
"product_id": "RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"relates_to_product_reference": "RT-8.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2873",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2022-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2119048"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an out-of-bounds vulnerability in i2c-ismt driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2873"
},
{
"category": "external",
"summary": "RHBZ#2119048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/",
"url": "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/"
}
],
"release_date": "2022-07-29T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:01:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module i2c-ismt from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an out-of-bounds vulnerability in i2c-ismt driver"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:01:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2141752"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel nfsd (network file system) subsystem. The way a user sends RPC over TCP with excess data added at the end of the message could allow a remote user to starve the resources, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Affected versions of the Red Hat Enterprise Linux are 8.7 and higher, because starting from the 8.7 the affected source code introduced with the errata RHSA-2022:7683.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "RHBZ#2141752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
}
],
"release_date": "2022-10-03T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-21T09:01:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"NFV-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"NFV-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.src",
"RT-8.7.0.Z.MAIN:kernel-rt-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-devel-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64",
"RT-8.7.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-425.13.1.rt7.223.el8_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data"
}
]
}
suse-su-2022:4542-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.14.21-150400_24_33 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2021-39698: Fixed a use-after-free in aio_poll_complete_work of aio.c (bsc#1196956).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4542,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4542",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4542-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4542-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224542-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4542-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html"
},
{
"category": "self",
"summary": "SUSE Bug 1196959",
"url": "https://bugzilla.suse.com/1196959"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39698 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39698/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP4)",
"tracking": {
"current_release_date": "2022-12-17T19:34:08Z",
"generator": {
"date": "2022-12-17T19:34:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4542-1",
"initial_release_date": "2022-12-17T19:34:08Z",
"revision_history": [
{
"date": "2022-12-17T19:34:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39698"
}
],
"notes": [
{
"category": "general",
"text": "In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39698",
"url": "https://www.suse.com/security/cve/CVE-2021-39698"
},
{
"category": "external",
"summary": "SUSE Bug 1196956 for CVE-2021-39698",
"url": "https://bugzilla.suse.com/1196956"
},
{
"category": "external",
"summary": "SUSE Bug 1196959 for CVE-2021-39698",
"url": "https://bugzilla.suse.com/1196959"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2021-39698",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T19:34:08Z",
"details": "important"
}
],
"title": "CVE-2021-39698"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T19:34:08Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T19:34:08Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_33-default-2-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T19:34:08Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4539-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150100_197_126 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4539,SUSE-SLE-Live-Patching-12-SP4-2022-4529,SUSE-SLE-Module-Live-Patching-15-2022-4541,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4539",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4539-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4539-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224539-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4539-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2022-12-17T19:04:56Z",
"generator": {
"date": "2022-12-17T19:04:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4539-1",
"initial_release_date": "2022-12-17T19:04:56Z",
"revision_history": [
{
"date": "2022-12-17T19:04:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_111-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_111-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T19:04:56Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T19:04:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T19:04:56Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T19:04:56Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2023:2148-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).\n- CVE-2023-1872:Fixed a use after free vulnerability in the io_uring subsystem, which could lead to local privilege escalation (bsc#1210414).\n- CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-2176: A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege (bsc#1210629).\n- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).\n- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).\n- CVE-2023-2008: A flaw was found in the fault handler of the udmabuf device driver. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code (bsc#1210453).\n- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).\n- CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).\n- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).\n- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).\n\nThe following non-security bugs were fixed:\n\n- Drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).\n- cifs: fix negotiate context parsing (bsc#1210301).\n- keys: Fix linking a duplicate key to a keyring\u0027s assoc_array (bsc#1207088).\n- vmxnet3: use gro callback when UPT is enabled (bsc#1209739).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2148,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2148,SUSE-SLE-Product-HA-15-SP3-2023-2148,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2148,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2148,SUSE-SLE-Product-RT-15-SP3-2023-2148,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2148,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2148,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2148,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2148,SUSE-SUSE-MicroOS-5.1-2023-2148,SUSE-SUSE-MicroOS-5.2-2023-2148,SUSE-Storage-7.1-2023-2148,openSUSE-SLE-15.4-2023-2148",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2148-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2148-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232148-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2148-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html"
},
{
"category": "self",
"summary": "SUSE Bug 1202353",
"url": "https://bugzilla.suse.com/1202353"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1206992",
"url": "https://bugzilla.suse.com/1206992"
},
{
"category": "self",
"summary": "SUSE Bug 1207088",
"url": "https://bugzilla.suse.com/1207088"
},
{
"category": "self",
"summary": "SUSE Bug 1209687",
"url": "https://bugzilla.suse.com/1209687"
},
{
"category": "self",
"summary": "SUSE Bug 1209739",
"url": "https://bugzilla.suse.com/1209739"
},
{
"category": "self",
"summary": "SUSE Bug 1209777",
"url": "https://bugzilla.suse.com/1209777"
},
{
"category": "self",
"summary": "SUSE Bug 1209871",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "self",
"summary": "SUSE Bug 1210202",
"url": "https://bugzilla.suse.com/1210202"
},
{
"category": "self",
"summary": "SUSE Bug 1210203",
"url": "https://bugzilla.suse.com/1210203"
},
{
"category": "self",
"summary": "SUSE Bug 1210301",
"url": "https://bugzilla.suse.com/1210301"
},
{
"category": "self",
"summary": "SUSE Bug 1210329",
"url": "https://bugzilla.suse.com/1210329"
},
{
"category": "self",
"summary": "SUSE Bug 1210336",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "self",
"summary": "SUSE Bug 1210337",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "self",
"summary": "SUSE Bug 1210414",
"url": "https://bugzilla.suse.com/1210414"
},
{
"category": "self",
"summary": "SUSE Bug 1210453",
"url": "https://bugzilla.suse.com/1210453"
},
{
"category": "self",
"summary": "SUSE Bug 1210469",
"url": "https://bugzilla.suse.com/1210469"
},
{
"category": "self",
"summary": "SUSE Bug 1210498",
"url": "https://bugzilla.suse.com/1210498"
},
{
"category": "self",
"summary": "SUSE Bug 1210506",
"url": "https://bugzilla.suse.com/1210506"
},
{
"category": "self",
"summary": "SUSE Bug 1210629",
"url": "https://bugzilla.suse.com/1210629"
},
{
"category": "self",
"summary": "SUSE Bug 1210647",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36691 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2196 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1611 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1670 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1838 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1855 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1872 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1989 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1990 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1998 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2008 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2162 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2176 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-30772 page",
"url": "https://www.suse.com/security/cve/CVE-2023-30772/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-05-09T15:05:52Z",
"generator": {
"date": "2023-05-09T15:05:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2148-1",
"initial_release_date": "2023-05-09T15:05:52Z",
"revision_history": [
{
"date": "2023-05-09T15:05:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-al-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-altera-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-amd-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-apm-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-arm-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-cavium-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-exynos-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-freescale-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-lg-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-marvell-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-qcom-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-renesas-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-socionext-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-sprd-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-150300.59.121.1.aarch64",
"product_id": "dtb-zte-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-64kb-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-default-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-default-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"product_id": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-default-extra-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-default-optional-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.121.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-preempt-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.121.2.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.121.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.121.1.aarch64",
"product_id": "kernel-syms-5.3.18-150300.59.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.121.2.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.121.2.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.121.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"product": {
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"product_id": "kernel-devel-5.3.18-150300.59.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150300.59.121.2.noarch",
"product": {
"name": "kernel-docs-5.3.18-150300.59.121.2.noarch",
"product_id": "kernel-docs-5.3.18-150300.59.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150300.59.121.2.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150300.59.121.2.noarch",
"product_id": "kernel-docs-html-5.3.18-150300.59.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"product": {
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"product_id": "kernel-macros-5.3.18-150300.59.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150300.59.121.2.noarch",
"product": {
"name": "kernel-source-5.3.18-150300.59.121.2.noarch",
"product_id": "kernel-source-5.3.18-150300.59.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150300.59.121.2.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150300.59.121.2.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150300.59.121.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-debug-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-default-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-default-optional-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.121.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.121.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150300.59.121.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150300.59.121.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"product_id": "dlm-kmp-default-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "kernel-default-5.3.18-150300.59.121.2.s390x",
"product_id": "kernel-default-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"product_id": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"product_id": "kernel-default-devel-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.121.2.s390x",
"product_id": "kernel-default-extra-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.121.2.s390x",
"product_id": "kernel-default-optional-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"product_id": "kernel-obs-build-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.121.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.121.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150300.59.121.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.121.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150300.59.121.1.s390x",
"product_id": "kernel-syms-5.3.18-150300.59.121.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.121.2.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-debug-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-default-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"product_id": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-default-extra-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-default-optional-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_121-preempt-1-150300.7.3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_121-preempt-1-150300.7.3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_121-preempt-1-150300.7.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.121.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.121.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.121.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-preempt-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.121.2.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.121.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.121.1.x86_64",
"product_id": "kernel-syms-5.3.18-150300.59.121.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.121.2.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.121.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_rt:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.121.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.ppc64le as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.s390x as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.ppc64le as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.s390x as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.121.2.s390x as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.121.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.121.2.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.121.2.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.121.2.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.121.2.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.121.2.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.121.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.121.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.121.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-al-5.3.18-150300.59.121.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64"
},
"product_reference": "dtb-al-5.3.18-150300.59.121.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-zte-5.3.18-150300.59.121.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
},
"product_reference": "dtb-zte-5.3.18-150300.59.121.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36691"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36691",
"url": "https://www.suse.com/security/cve/CVE-2020-36691"
},
{
"category": "external",
"summary": "SUSE Bug 1209613 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209613"
},
{
"category": "external",
"summary": "SUSE Bug 1209777 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2022-2196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2196"
}
],
"notes": [
{
"category": "general",
"text": "A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn\u0027t need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2196",
"url": "https://www.suse.com/security/cve/CVE-2022-2196"
},
{
"category": "external",
"summary": "SUSE Bug 1206992 for CVE-2022-2196",
"url": "https://bugzilla.suse.com/1206992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-2196"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2023-1611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1611"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1611",
"url": "https://www.suse.com/security/cve/CVE-2023-1611"
},
{
"category": "external",
"summary": "SUSE Bug 1209687 for CVE-2023-1611",
"url": "https://bugzilla.suse.com/1209687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1670"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1670",
"url": "https://www.suse.com/security/cve/CVE-2023-1670"
},
{
"category": "external",
"summary": "SUSE Bug 1209871 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1838"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1838",
"url": "https://www.suse.com/security/cve/CVE-2023-1838"
},
{
"category": "external",
"summary": "SUSE Bug 1210203 for CVE-2023-1838",
"url": "https://bugzilla.suse.com/1210203"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-1838"
},
{
"cve": "CVE-2023-1855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1855"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1855",
"url": "https://www.suse.com/security/cve/CVE-2023-1855"
},
{
"category": "external",
"summary": "SUSE Bug 1210202 for CVE-2023-1855",
"url": "https://bugzilla.suse.com/1210202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1872"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx-\u003euring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1872",
"url": "https://www.suse.com/security/cve/CVE-2023-1872"
},
{
"category": "external",
"summary": "SUSE Bug 1210414 for CVE-2023-1872",
"url": "https://bugzilla.suse.com/1210414"
},
{
"category": "external",
"summary": "SUSE Bug 1210417 for CVE-2023-1872",
"url": "https://bugzilla.suse.com/1210417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "important"
}
],
"title": "CVE-2023-1872"
},
{
"cve": "CVE-2023-1989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1989"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1989",
"url": "https://www.suse.com/security/cve/CVE-2023-1989"
},
{
"category": "external",
"summary": "SUSE Bug 1210336 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "external",
"summary": "SUSE Bug 1210500 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210500"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "important"
}
],
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1990"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1990",
"url": "https://www.suse.com/security/cve/CVE-2023-1990"
},
{
"category": "external",
"summary": "SUSE Bug 1210337 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "external",
"summary": "SUSE Bug 1210501 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210501"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1998"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1998",
"url": "https://www.suse.com/security/cve/CVE-2023-1998"
},
{
"category": "external",
"summary": "SUSE Bug 1210506 for CVE-2023-1998",
"url": "https://bugzilla.suse.com/1210506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-2008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2008"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2008",
"url": "https://www.suse.com/security/cve/CVE-2023-2008"
},
{
"category": "external",
"summary": "SUSE Bug 1210453 for CVE-2023-2008",
"url": "https://bugzilla.suse.com/1210453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-2008"
},
{
"cve": "CVE-2023-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2124"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2124",
"url": "https://www.suse.com/security/cve/CVE-2023-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1210498 for CVE-2023-2124",
"url": "https://bugzilla.suse.com/1210498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2162"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2162",
"url": "https://www.suse.com/security/cve/CVE-2023-2162"
},
{
"category": "external",
"summary": "SUSE Bug 1210647 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "external",
"summary": "SUSE Bug 1210662 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210662"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2176"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2176",
"url": "https://www.suse.com/security/cve/CVE-2023-2176"
},
{
"category": "external",
"summary": "SUSE Bug 1210629 for CVE-2023-2176",
"url": "https://bugzilla.suse.com/1210629"
},
{
"category": "external",
"summary": "SUSE Bug 1210630 for CVE-2023-2176",
"url": "https://bugzilla.suse.com/1210630"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-2176",
"url": "https://bugzilla.suse.com/1213842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "important"
}
],
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-30772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-30772"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-30772",
"url": "https://www.suse.com/security/cve/CVE-2023-30772"
},
{
"category": "external",
"summary": "SUSE Bug 1210329 for CVE-2023-30772",
"url": "https://bugzilla.suse.com/1210329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.121.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.121.2.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.121.2.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.121.2.s390x",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.121.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.121.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:05:52Z",
"details": "moderate"
}
],
"title": "CVE-2023-30772"
}
]
}
suse-su-2022:4520-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-197_108 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4520,SUSE-SLE-Live-Patching-12-SP5-2022-4520,SUSE-SLE-Live-Patching-12-SP5-2022-4522,SUSE-SLE-Live-Patching-12-SP5-2022-4525,SUSE-SLE-Live-Patching-12-SP5-2022-4526,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4521,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4523,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4524",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4520-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4520-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224520-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4520-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2022-12-17T11:04:44Z",
"generator": {
"date": "2022-12-17T11:04:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4520-1",
"initial_release_date": "2022-12-17T11:04:44Z",
"revision_history": [
{
"date": "2022-12-17T11:04:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4580-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150200_24_112 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4580,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4580",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4580-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4580-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224580-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4580-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2022-12-20T09:04:52Z",
"generator": {
"date": "2022-12-20T09:04:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4580-1",
"initial_release_date": "2022-12-20T09:04:52Z",
"revision_history": [
{
"date": "2022-12-20T09:04:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_112-preempt-11-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_112-preempt-11-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_112-preempt-11-150200.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4595-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-95_93 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4595,SUSE-SLE-Live-Patching-12-SP4-2022-4595",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4595-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4595-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224595-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4595-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP4)",
"tracking": {
"current_release_date": "2022-12-20T16:06:11Z",
"generator": {
"date": "2022-12-20T16:06:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4595-1",
"initial_release_date": "2022-12-20T16:06:11Z",
"revision_history": [
{
"date": "2022-12-20T16:06:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4616-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).\n- ALSA: hda: fix potential memleak in \u0027add_widget_node\u0027 (git-fixes).\n- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).\n- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).\n- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).\n- ASoC: codecs: jz4725b: Fix spelling mistake \u0027Sourc\u0027 -\u003e \u0027Source\u0027, \u0027Routee\u0027 -\u003e \u0027Route\u0027 (git-fixes).\n- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).\n- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).\n- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).\n- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).\n- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).\n- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).\n- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).\n- ASoC: wm5102: Revert \u0027ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe\u0027 (git-fixes).\n- ASoC: wm5110: Revert \u0027ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe\u0027 (git-fixes).\n- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).\n- ASoC: wm8997: Revert \u0027ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe\u0027 (git-fixes).\n- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).\n- Do not enable CONFIG_ATARI_PARTITION (jsc#PED-1573)\n- Drivers: hv: vmbus: Add /sys/bus/vmbus/hibernation (git-fixes).\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017).\n- Drivers: hv: vmbus: Drop error message when \u0027No request id available\u0027 (bsc#1204017).\n- Drivers: hv: vmbus: Fix duplicate CPU assignments within a device (git-fixes).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).\n- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).\n- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).\n- Drivers: hv: vmbus: Remove unused linux/version.h header (git-fixes).\n- Drivers: hv: vmbus: Replace smp_store_mb() with virt_store_mb() (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: remove unused function (git-fixes).\n- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).\n- Input: i8042 - fix leaking of platform device on module removal (git-fixes).\n- Input: iforce - invert valid length check when fetching device IDs (git-fixes).\n- KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support (git-fixes).\n- KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1 (git-fixes).\n- KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT) (git-fixes).\n- KVM: nVMX: clear PIN_BASED_POSTED_INTR from nested pinbased_ctls only when apicv is globally disabled (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes).\n- KVM: s390: Fix handle_sske page fault handling (git-fixes).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes).\n- KVM: s390: get rid of register asm usage (git-fixes).\n- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).\n- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).\n- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).\n- KVM: s390: reduce number of IO pins to 1 (git-fixes).\n- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).\n- NFS: Refactor nfs_instantiate() for dentry referencing callers (bsc#1204215).\n- NFSv3: use nfs_add_or_obtain() to create and reference inodes (bsc#1204215).\n- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).\n- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).\n- PCI: hv: Drop msi_controller structure (bsc#1204446).\n- PCI: hv: Fix a race condition when removing the device (bsc#1204446).\n- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).\n- PCI: hv: Fix typo (bsc#1204446).\n- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).\n- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).\n- PCI: hv: Support for create interrupt v3 (bsc#1204446).\n- PCI: hv: Use PCI_ERROR_RESPONSE to identify config read errors (bsc#1204446).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- RDMA/core/sa_query: Remove unused argument (git-fixes)\n- RDMA/hns: Fix spelling mistakes of original (git-fixes)\n- RDMA/qedr: Add support for user mode XRC-SRQ\u0027s (git-fixes)\n- RDMA/qedr: Fix reporting max_{send/recv}_wr attrs (git-fixes)\n- RDMA/qedr: Remove unsupported qedr_resize_cq callback (git-fixes)\n- RDMA/rxe: Fix memory leak in error path code (git-fixes)\n- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).\n- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID.\n- Xen/gntdev: do not ignore kernel unmapping error (git-fixes).\n- add another bug reference to some hyperv changes (bsc#1205617).\n- arm/xen: Do not probe xenbus as part of an early initcall (git-fixes).\n- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes)\n- arm64: dts: juno: Add thermal critical trip points (git-fixes)\n- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).\n- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).\n- blk-crypto: fix check for too-large dun_bytes (git-fixes).\n- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).\n- blk-mq: do not create hctx debugfs dir until q-\u003edebugfs_dir is created (git-fixes).\n- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern (git-fixes).\n- block: Add a helper to validate the block size (git-fixes).\n- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1204328).\n- block: ataflop: fix breakage introduced at blk-mq refactoring (git-fixes).\n- block: ataflop: more blk-mq refactoring fixes (git-fixes).\n- block: fix infinite loop for invalid zone append (git-fixes).\n- block: limit request dispatch loop duration (git-fixes).\n- block: nbd: add sanity check for first_minor (git-fixes).\n- block: use \u0027unsigned long\u0027 for blk_validate_block_size() (git-fixes).\n- bus: sunxi-rsb: Support atomic transfers (git-fixes).\n- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).\n- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).\n- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1205989).\n- ceph: do not access the kiocb after aio requests (bsc#1205984).\n- ceph: fix fscache invalidation (bsc#1205985).\n- ceph: lockdep annotations for try_nonblocking_invalidate (bsc#1205988).\n- ceph: remove bogus checks and WARN_ONs from ceph_set_page_dirty (bsc#1205986).\n- ceph: request Fw caps before updating the mtime in ceph_write_iter (bsc#1205987).\n- cifs: skip extra NULL byte in filenames (bsc#1204791).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm integrity: set journal entry unused when shrinking device (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm raid: fix address sanitizer warning in raid_resume (git-fixes).\n- dm raid: fix address sanitizer warning in raid_status (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm verity fec: fix misaligned RS roots IO (git-fixes).\n- dm writecache: fix writing beyond end of underlying device when shrinking (git-fixes).\n- dm writecache: return the exact table values that were set (git-fixes).\n- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).\n- dm: fix request-based DM to not bounce through indirect dm_submit_bio (git-fixes).\n- dm: remove special-casing of bio-based immutable singleton target on NVMe (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).\n- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).\n- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).\n- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).\n- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).\n- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).\n- dmaengine: at_hdmac: Fix impossible condition (git-fixes).\n- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).\n- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).\n- drivers/hv: remove obsolete TODO and fix misleading typo in comment (git-fixes).\n- drivers: hv: Fix EXPORT_SYMBOL and tab spaces issue (git-fixes).\n- drivers: hv: Fix hyperv_record_panic_msg path on comment (git-fixes).\n- drivers: hv: Fix missing error code in vmbus_connect() (git-fixes).\n- drivers: hv: vmbus: Fix call msleep using \u0026lt; 20ms (git-fixes).\n- drivers: hv: vmbus: Fix checkpatch LINE_SPACING (git-fixes).\n- drivers: hv: vmbus: Fix checkpatch SPLIT_STRING (git-fixes).\n- drivers: hv: vmbus: Replace symbolic permissions by octal permissions (git-fixes).\n- drivers: net: slip: fix NPD bug in sl_tx_timeout() (git-fixes).\n- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).\n- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).\n- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).\n- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).\n- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).\n- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).\n- drm/rockchip: dsi: Force synchronous probe (git-fixes).\n- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).\n- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).\n- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).\n- firmware: arm_scmi: Suppress the driver\u0027s bind attributes (git-fixes).\n- ftrace: Fix char print issue in print_ip_ins() (git-fixes).\n- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).\n- fuse: add file_modified() to fallocate (bsc#1205330).\n- fuse: fix readdir cache race (bsc#1205329).\n- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).\n- hv: hyperv.h: Remove unused inline functions (git-fixes).\n- hv_netvsc: Add a comment clarifying batching logic (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_netvsc: Add error handling while switching data path (bsc#1204850).\n- hv_netvsc: Allocate the recv_buf buffers after NVSP_MSG1_TYPE_SEND_RECV_BUF (git-fixes).\n- hv_netvsc: Check VF datapath when sending traffic to VF (git-fixes).\n- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).\n- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).\n- hv_netvsc: Use bitmap_zalloc() when applicable (git-fixes).\n- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- hv_netvsc: Validate number of allocated sub-channels (git-fixes).\n- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).\n- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).\n- hv_utils: Fix passing zero to \u0027PTR_ERR\u0027 warning (git-fixes).\n- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).\n- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).\n- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).\n- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).\n- i2c: i801: add lis3lv02d\u0027s I2C address for Vostro 5568 (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).\n- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).\n- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).\n- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).\n- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).\n- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).\n- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).\n- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).\n- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).\n- iwlwifi: dbg: disable ini debug in 9000 family and below (git-fixes).\n- kABI: Fix after adding trace_iterator.wait_index (git-fixes).\n- kABI: remove new member of usbip_device (git-fixes).\n- kabi: fix transport_add_device change (git-fixes).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- kvm: nVMX: reflect MTF VM-exits if injected by L1 (git-fixes).\n- livepatch: Add a missing newline character in klp_module_coming() (bsc#1071995).\n- livepatch: fix race between fork and KLP transition (bsc#1071995).\n- loop: Check for overflow while configuring loop (git-fixes).\n- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes).\n- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).\n- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).\n- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).\n- media: venus: dec: Handle the case where find_format fails (git-fixes).\n- media: vim2m: initialize the media device earlier (git-fixes).\n- media: vivid: fix assignment of dev-\u003efbuf_out_flags (git-fixes).\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).\n- mmc: core: properly select voltage range without power cycle (git-fixes).\n- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).\n- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).\n- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).\n- nbd: Fix use-after-free in pid_show (git-fixes).\n- nbd: fix possible overflow for \u0027first_minor\u0027 in nbd_dev_add() (git-fixes).\n- nbd: fix possible overflow on \u0027first_minor\u0027 in nbd_dev_add() (git-fixes).\n- nbd: handle device refs for DESTROY_ON_DISCONNECT properly (git-fixes).\n- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).\n- net: ethernet: nixge: fix NULL dereference (git-fixes).\n- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- net: phy: fix null-ptr-deref while probe() failed (git-fixes).\n- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).\n- net: usb: qmi_wwan: Set DTR quirk for MR400 (git-fixes).\n- net: usb: qmi_wwan: restore mtu min/max values after raw_ip switch (git-fixes).\n- nfc/nci: fix race with opening and closing (git-fixes).\n- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).\n- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).\n- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).\n- nfsd: set the server_scope during service startup (bsc#1203746).\n- null_blk: Fail zone append to conventional zones (git-fixes).\n- null_blk: synchronization fix for zoned device (git-fixes).\n- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- parport_pc: Avoid FIFO port location truncation (git-fixes).\n- phy: stm32: fix an error code in probe (git-fixes).\n- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).\n- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).\n- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).\n- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).\n- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).\n- printk: use atomic updates for klogd work (bsc#1204934).\n- printk: wake waiters for safe and NMI contexts (bsc#1204934).\n- r8152: Add MAC passthrough support to new device (git-fixes).\n- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).\n- r8152: use new helper tcp_v6_gso_csum_prep (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- regulator: core: fix UAF in destroy_regulator() (git-fixes).\n- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).\n- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).\n- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Allow splice to read previous partially read pages (git-fixes).\n- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).\n- ring-buffer: Fix race between reset page and reading page (git-fixes).\n- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).\n- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- rndis_host: increase sleep time in the query-response loop (git-fixes).\n- rtc: mt6397: fix alarm register overwrite (git-fixes).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- s390/cpcmd: fix inline assembly register clobbering (git-fixes).\n- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).\n- s390/disassembler: increase ebpf disasm buffer size (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205428 LTC#200501).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (bsc#1203144 LTC#199881).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (git-fixes).\n- s390/ptrace: return -ENOSYS when invalid syscall is supplied (git-fixes).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).\n- s390/vtime: fix inline assembly clobber list (git-fixes).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- s390/zcrypt: fix zcard and zqueue hot-unplug memleak (git-fixes).\n- s390: Remove arch_has_random, arch_has_random_seed (git-fixes).\n- s390: fix double free of GS and RI CBs on fork() failure (git-fixes).\n- s390: fix nospec table alignments (git-fixes).\n- s390: mark __cpacf_query() as __always_inline (git-fixes).\n- scsi: bsg: Remove support for SCSI_IOCTL_SEND_COMMAND (git-fixes).\n- scsi: drivers: base: Propagate errors through the transport component (git-fixes).\n- scsi: drivers: base: Support atomic version of attribute_container_device_trigger (git-fixes).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729 bsc#1204810 ltc#200162).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).\n- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).\n- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).\n- scsi: lpfc: Fix spelling mistake \u0027unsolicted\u0027 -\u003e \u0027unsolicited\u0027 (bsc#1204957).\n- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).\n- scsi: lpfc: Set sli4_param\u0027s cmf option to zero when CMF is turned off (bsc#1204957).\n- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).\n- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).\n- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).\n- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).\n- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).\n- scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).\n- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).\n- scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).\n- scsi: storvsc: Miscellaneous code cleanups (git-fixes).\n- scsi: storvsc: Parameterize number hardware queues (git-fixes).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).\n- scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).\n- scsi: storvsc: Update error logging (git-fixes).\n- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).\n- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).\n- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- selftests/livepatch: better synchronize test_klp_callbacks_busy (bsc#1071995).\n- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).\n- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).\n- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).\n- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).\n- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).\n- serial: imx: Add missing .thaw_noirq hook (git-fixes).\n- siox: fix possible memory leak in siox_device_add() (git-fixes).\n- slimbus: stream: correct presence rate frequencies (git-fixes).\n- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).\n- spi: stm32: Print summary \u0027callbacks suppressed\u0027 message (git-fixes).\n- staging: greybus: light: fix a couple double frees (git-fixes).\n- swiotlb-xen: use vmalloc_to_page on vmalloc virt addresses (git-fixes).\n- tracing/ring-buffer: Have polling block on watermark (git-fixes).\n- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).\n- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).\n- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).\n- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).\n- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).\n- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).\n- tracing: Wake up waiters when tracing is disabled (git-fixes).\n- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: fix PHY disable sequence (git-fixes).\n- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).\n- usb: dwc3: gadget: Fix null pointer exception (git-fixes).\n- usb: dwc3: qcom: fix runtime PM wakeup.\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).\n- usbip: add sysfs_lock to synchronize sysfs code paths (git-fixes).\n- usbip: stub-dev synchronize sysfs code paths (git-fixes).\n- usbip: stub_dev: remake locking for kABI (git-fixes).\n- usbip: synchronize event handler with sysfs code paths (git-fixes).\n- usbip: usbip_event: use global lock (git-fixes).\n- usbip: vudc synchronize sysfs code paths (git-fixes).\n- usbip: vudc_sysfs: use global lock (git-fixes).\n- use __netdev_notify_peers in hyperv (git-fixes).\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027 (bsc#1200845)\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- virtio_blk: eliminate anonymous module_init \u0026 module_exit (git-fixes).\n- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).\n- vmlinux.lds.h: Fix placement of \u0027.data..decrypted\u0027 section (git-fixes).\n- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).\n- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).\n- wifi: cfg80211: silence a sparse RCU warning (git-fixes).\n- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).\n- workqueue: do not skip lockdep work dependency in cancel_work_sync() (bsc#1204967).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- x86/hyperv: check cpu mask after interrupt has been disabled (git-fixes).\n- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/xen: Add xen_no_vector_callback option to test PCI INTX delivery (git-fixes).\n- x86/xen: Distribute switch variables for initialization (git-fixes).\n- x86/xen: do not unbind uninitialized lock_kicker_irq (git-fixes).\n- xen-blkback: prevent premature module unload (git-fixes).\n- xen-netback: correct success/error reporting for the SKB-with-fraglist case (git-fixes).\n- xen/balloon: fix balloon kthread freezing (git-fixes).\n- xen/balloon: fix ballooned page accounting without hotplug enabled (git-fixes).\n- xen/balloon: fix cancelled balloon action (git-fixes).\n- xen/balloon: use a kernel thread instead a workqueue (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/gntdev: Prevent leaking grants (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen/privcmd: Corrected error handling path (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/xenbus: Fix granting of vmalloc\u0027d memory (git-fixes).\n- xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status (git-fixes).\n- xen: Fix XenStore initialisation for XS_LOCAL (git-fixes).\n- xen: Fix event channel callback via INTX/GSI (git-fixes).\n- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu\u003e=32 (git-fixes).\n- xenbus: req-\u003ebody should be updated before req-\u003estate (git-fixes).\n- xenbus: req-\u003eerr should be updated before req-\u003estate (git-fixes).\n- xfs: Lower CIL flush limit for large logs (git-fixes).\n- xfs: Throttle commits on delayed background CIL push (git-fixes).\n- xfs: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- xfs: check owner of dir3 blocks (git-fixes).\n- xfs: factor common AIL item deletion code (git-fixes).\n- xfs: open code insert range extent split helper (git-fixes).\n- xfs: rework collapse range into an atomic operation (git-fixes).\n- xfs: rework insert range into an atomic operation (git-fixes).\n- xfs: tail updates only need to occur when LSN changes (git-fixes).\n- xfs: trylock underlying buffer on dquot flush (git-fixes).\n- xfs: xfs_buf_corruption_error should take __this_address (git-fixes).\n- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4616,SUSE-SLE-Module-Basesystem-15-SP3-2022-4616,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4616,SUSE-SLE-Module-Legacy-15-SP3-2022-4616,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4616,SUSE-SLE-Product-HA-15-SP3-2022-4616,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2022-4616,SUSE-SLE-Product-HPC-15-SP3-LTSS-2022-4616,SUSE-SLE-Product-RT-15-SP3-2022-4616,SUSE-SLE-Product-SLES-15-SP3-BCL-2022-4616,SUSE-SLE-Product-SLES-15-SP3-LTSS-2022-4616,SUSE-SLE-Product-SLES_SAP-15-SP3-2022-4616,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2022-4616,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2022-4616,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2022-4616,SUSE-SLE-Product-WE-15-SP3-2022-4616,SUSE-SUSE-MicroOS-5.1-2022-4616,SUSE-SUSE-MicroOS-5.2-2022-4616,SUSE-Storage-7.1-2022-4616,openSUSE-Leap-Micro-5.2-2022-4616,openSUSE-SLE-15.3-2022-4616,openSUSE-SLE-15.4-2022-4616",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4616-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4616-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224616-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4616-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1189297",
"url": "https://bugzilla.suse.com/1189297"
},
{
"category": "self",
"summary": "SUSE Bug 1192761",
"url": "https://bugzilla.suse.com/1192761"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1201469",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "self",
"summary": "SUSE Bug 1203144",
"url": "https://bugzilla.suse.com/1203144"
},
{
"category": "self",
"summary": "SUSE Bug 1203746",
"url": "https://bugzilla.suse.com/1203746"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204142",
"url": "https://bugzilla.suse.com/1204142"
},
{
"category": "self",
"summary": "SUSE Bug 1204215",
"url": "https://bugzilla.suse.com/1204215"
},
{
"category": "self",
"summary": "SUSE Bug 1204228",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "self",
"summary": "SUSE Bug 1204241",
"url": "https://bugzilla.suse.com/1204241"
},
{
"category": "self",
"summary": "SUSE Bug 1204328",
"url": "https://bugzilla.suse.com/1204328"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204446",
"url": "https://bugzilla.suse.com/1204446"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204693",
"url": "https://bugzilla.suse.com/1204693"
},
{
"category": "self",
"summary": "SUSE Bug 1204780",
"url": "https://bugzilla.suse.com/1204780"
},
{
"category": "self",
"summary": "SUSE Bug 1204791",
"url": "https://bugzilla.suse.com/1204791"
},
{
"category": "self",
"summary": "SUSE Bug 1204810",
"url": "https://bugzilla.suse.com/1204810"
},
{
"category": "self",
"summary": "SUSE Bug 1204827",
"url": "https://bugzilla.suse.com/1204827"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1204934",
"url": "https://bugzilla.suse.com/1204934"
},
{
"category": "self",
"summary": "SUSE Bug 1204957",
"url": "https://bugzilla.suse.com/1204957"
},
{
"category": "self",
"summary": "SUSE Bug 1204963",
"url": "https://bugzilla.suse.com/1204963"
},
{
"category": "self",
"summary": "SUSE Bug 1204967",
"url": "https://bugzilla.suse.com/1204967"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205264",
"url": "https://bugzilla.suse.com/1205264"
},
{
"category": "self",
"summary": "SUSE Bug 1205329",
"url": "https://bugzilla.suse.com/1205329"
},
{
"category": "self",
"summary": "SUSE Bug 1205330",
"url": "https://bugzilla.suse.com/1205330"
},
{
"category": "self",
"summary": "SUSE Bug 1205428",
"url": "https://bugzilla.suse.com/1205428"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205567",
"url": "https://bugzilla.suse.com/1205567"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205700",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205753",
"url": "https://bugzilla.suse.com/1205753"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1205984",
"url": "https://bugzilla.suse.com/1205984"
},
{
"category": "self",
"summary": "SUSE Bug 1205985",
"url": "https://bugzilla.suse.com/1205985"
},
{
"category": "self",
"summary": "SUSE Bug 1205986",
"url": "https://bugzilla.suse.com/1205986"
},
{
"category": "self",
"summary": "SUSE Bug 1205987",
"url": "https://bugzilla.suse.com/1205987"
},
{
"category": "self",
"summary": "SUSE Bug 1205988",
"url": "https://bugzilla.suse.com/1205988"
},
{
"category": "self",
"summary": "SUSE Bug 1205989",
"url": "https://bugzilla.suse.com/1205989"
},
{
"category": "self",
"summary": "SUSE Bug 1206032",
"url": "https://bugzilla.suse.com/1206032"
},
{
"category": "self",
"summary": "SUSE Bug 1206037",
"url": "https://bugzilla.suse.com/1206037"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3707 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-23T09:56:07Z",
"generator": {
"date": "2022-12-23T09:56:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4616-1",
"initial_release_date": "2022-12-23T09:56:07Z",
"revision_history": [
{
"date": "2022-12-23T09:56:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-al-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-altera-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-amd-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-apm-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-arm-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-cavium-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-exynos-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-freescale-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-lg-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-marvell-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-qcom-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-renesas-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-socionext-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-sprd-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-150300.59.106.1.aarch64",
"product_id": "dtb-zte-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-64kb-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-default-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"product_id": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.106.1.aarch64",
"product_id": "kernel-syms-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"product_id": "kernel-devel-5.3.18-150300.59.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"product_id": "kernel-docs-5.3.18-150300.59.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150300.59.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"product_id": "kernel-macros-5.3.18-150300.59.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150300.59.106.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch",
"product_id": "kernel-source-5.3.18-150300.59.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150300.59.106.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-default-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-default-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"product_id": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-default-optional-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-syms-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-debug-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-default-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"product_id": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_106-preempt-1-150300.7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_106-preempt-1-150300.7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_106-preempt-1-150300.7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"product_id": "kernel-syms-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_rt:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL"
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.ppc64le as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.s390x as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.s390x as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.106.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-al-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-al-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-altera-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-amd-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-apm-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-arm-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-lg-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-zte-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-zte-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.106.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.106.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-150300.59.106.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.106.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.106.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-150300.59.106.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-al-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-al-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-zte-5.3.18-150300.59.106.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64"
},
"product_reference": "dtb-zte-5.3.18-150300.59.106.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3707"
}
],
"notes": [
{
"category": "general",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3707",
"url": "https://www.suse.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "SUSE Bug 1204780 for CVE-2022-3707",
"url": "https://bugzilla.suse.com/1204780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4129"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4129",
"url": "https://www.suse.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "SUSE Bug 1205711 for CVE-2022-4129",
"url": "https://bugzilla.suse.com/1205711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_106-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-BCL:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.106.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Retail Branch Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.106.1.noarch",
"SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.106.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:56:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4617-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).\n- CVE-2022-3633: Fixed a memory leak in j1939_session_destroy of the file net/can/j1939/transport.c (bsc#1204650).\n- CVE-2022-3114: Fixed a denial of service in imx_register_uart_clocks() in drivers/clk/imx/clk.c (bsc#1206391).\n- CVE-2022-3619: Fixed a memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (bsc#1204569).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-3545: Fixed a use-after-free vulnerability is area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).\n- CVE-2022-2153: Fixed a NULL pointer dereference in KVM when attempting to set a SynIC IRQ (bsc#1200788).\n- CVE-2022-33981: Fixed a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function (bsc#1200692).\n- CVE-2022-45869: Fixed a race condition in the x86 KVM subsystem which could cause a denial of service (bsc#1205882).\n- CVE-2022-45888: Fixed a use-after-free during physical removal of a USB devices when using drivers/char/xillybus/xillyusb.c (bsc#1205764).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-3566: Fixed a race condition in the functions tcp_getsockopt/tcp_setsockopt. The manipulation leads to a race condition (bsc#1204405).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n- CVE-2022-3625: Fixed a user-after-free vulnerability in devlink_param_set/devlink_param_get of the file net/core/devlink.c (bsc#1204637).\n- CVE-2022-3535: Fixed a memory leak in mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bsc#1204417).\n- CVE-2022-39189: Fixed an issue were an unprivileged guest users can compromise the guest kernel because TLB flush operations were mishandled in certain KVM_VCPU_PREEMPTED situations (bsc#1203066).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-2978: Fixed a use-after-free in the NILFS file system (bsc#1202700).\n- CVE-2022-1184: Fixed a use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (bsc#1198577).\n- CVE-2022-1263: Fixed a NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allowed an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service (bsc#1198189).\n- CVE-2022-1882: Fixed a use-after-free flaw in free_pipe_info() that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1199904).\n- CVE-2022-20369: Fixed possible out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bsc#1202347).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-26373: Fixed CPU information leak via post-barrier RSB predictions (bsc#1201726).\n- CVE-2022-2639: Fixed integer underflow that could lead to out-of-bounds write in reserve_sfa_size() (bsc#1202154).\n- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-28356: Fixed a refcount bug in llc_ui_bind and llc_ui_autobind which could allow an unprivileged user to execute a denial of service. (bsc#1197391)\n- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bsc#1202558).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202860).\n- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bsc#1202623).\n- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bsc#1202681).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-3028: Fixed a race condition that was found in the IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bsc#1202898).\n- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bsc#1203041).\n- CVE-2022-3202: Fixed a NULL pointer dereference flaw in Journaled File System. This could allow a local attacker to crash the system or leak kernel internal information (bsc#1203389).\n- CVE-2022-32250: Fixed user-after-free in net/netfilter/nf_tables_api.c that could allow local privilege escalation (bsc#1200015).\n- CVE-2022-32296: Fixed vulnerability where TCP servers were allowed to identify clients by observing what source ports are used (bsc#1200288).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bsc#1203552).\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bsc#1203769).\n- CVE-2022-3435: Fixed an out-of-bounds read in fib_nh_match() of the file net/ipv4/fib_semantics.c (bsc#1204171).\n- CVE-2022-3526: Fixed a memory leak in macvlan_handle_frame() from drivers/net/macvlan.c (bsc#1204353).\n- CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bsc#1201948).\n- CVE-2022-36946: Fixed a denial of service inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bsc#1201940).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bsc#1203107).\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bsc#1203117).\n- CVE-2022-40476: Fixed a null pointer dereference in fs/io_uring.c (bsc#1203435).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bsc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bsc#1203992).\n- CVE-2022-42719: Fixed remote code execution with wlan frames when parsing a multi-BSSID element (bsc#1204051).\n- CVE-2022-42720: Fixed remote code execution due to refcounting bugs (bsc#1204059).\n- CVE-2022-42721: Fixed remote code execution due list corruption in the wlan stack (bsc#1204060).\n- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)\n- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bsc#1199515).\n- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bsc#1177471)\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bsc#1196616).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bsc#1023051).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).\n- ACPI / scan: Create platform device for CS35L41 (bsc#1203699).\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() (git-fixes).\n- ACPI: APEI: do not add task_work to kernel thread to avoid memory leak (git-fixes).\n- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: HMAT: Fix initiator registration for single-initiator systems (git-fixes).\n- ACPI: HMAT: Release platform device in case of platform_device_add_data() fails (git-fixes).\n- ACPI: HMAT: remove unnecessary variable initialization (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: VIOT: Fix ACS setup (git-fixes).\n- ACPI: extlog: Handle multiple records (git-fixes).\n- ACPI: processor idle: Practically limit \u0027Dummy wait\u0027 workaround to old Intel systems (bsc#1203767).\n- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: resource: skip IRQ override on AMD Zen platforms (git-fixes).\n- ACPI: scan: Add CLSA0101 Laptop Support (bsc#1203699).\n- ACPI: scan: Add LATT2021 to acpi_ignore_dep_ids[] (git-fixes).\n- ACPI: tables: FPDT: Do not call acpi_os_map_memory() on invalid phys address (git-fixes).\n- ACPI: thermal: drop an always true check (git-fixes).\n- ACPI: utils: Add api to read _SUB from ACPI (bsc#1203699).\n- ACPI: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Make backlight class device registration a separate step (v2) (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ACPI: x86: Add a quirk for Dell Inspiron 14 2-in-1 for StorageD3Enable (git-fixes).\n- ACPI: x86: Add another system to quirk list for forcing StorageD3Enable (git-fixes).\n- ALSA: Use del_timer_sync() before freeing timer (git-fixes).\n- ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() (git-fixes).\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: aoa: Fix I2S device accounting (git-fixes).\n- ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() (git-fixes).\n- ALSA: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).\n- ALSA: au88x0: use explicitly signed char (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: core: Fix double-free at snd_card_new() (git-fixes).\n- ALSA: cs35l41: Check hw_config before using it (bsc#1203699).\n- ALSA: cs35l41: Enable Internal Boost in shared lib (bsc#1203699).\n- ALSA: cs35l41: Move cs35l41_gpio_config to shared lib (bsc#1203699).\n- ALSA: cs35l41: Unify hardware configuration (bsc#1203699).\n- ALSA: dice: fix regression for Lexicon I-ONIX FW810S (git-fixes).\n- ALSA: dmaengine: increment buffer pointer atomically (git-fixes).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Warlock (bsc#1203699).\n- ALSA: hda/cs8409: Add new Dolphin HW variants (bsc#1203699).\n- ALSA: hda/cs8409: Disable HSBIAS_SENSE_EN for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Fix Full Scale Volume setting for all variants (bsc#1203699).\n- ALSA: hda/cs8409: Fix Warlock to use mono mic configuration (bsc#1203699).\n- ALSA: hda/cs8409: Re-order quirk table into ascending order (bsc#1203699).\n- ALSA: hda/cs8409: Support manual mode detection for CS42L42 (bsc#1203699).\n- ALSA: hda/cs8409: Support new Dolphin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Odin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Warlock MLK Variants (bsc#1203699).\n- ALSA: hda/cs8409: Use general cs42l42 include in cs8409 hda driver (bsc#1203699).\n- ALSA: hda/cs8409: change cs8409_fixups v.pins initializers to static (bsc#1203699).\n- ALSA: hda/cs_dsp_ctl: Fix mutex inversion when creating controls (bsc#1203699).\n- ALSA: hda/hdmi - enable runtime pm for more AMD display audio (git-fixes).\n- ALSA: hda/hdmi: Do not skip notification handling during PM operation (git-fixes).\n- ALSA: hda/hdmi: Fix the converter allocation for the silent stream (git-fixes).\n- ALSA: hda/hdmi: Fix the converter reuse for the silent stream (git-fixes).\n- ALSA: hda/hdmi: change type for the \u0027assigned\u0027 variable (git-fixes).\n- ALSA: hda/realtek: Add CS35L41 support for Thinkpad laptops (bsc#1203699).\n- ALSA: hda/realtek: Add Intel Reference SSID to support headset keys (git-fixes).\n- ALSA: hda/realtek: Add Positivo C6300 model quirk (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 16 (8902) mute LED (git-fixes).\n- ALSA: hda/realtek: Add another HP ZBook G9 model quirks (bsc#1203699).\n- ALSA: hda/realtek: Add mute and micmut LED support for Zbook Fury 17 G9 (bsc#1203699).\n- ALSA: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).\n- ALSA: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (bsc#1203922).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga7 14IAL7 (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbooks using CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).\n- ALSA: hda/realtek: Add support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Add support for Legion 7 16ACHg6 laptop (bsc#1203699).\n- ALSA: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5570 laptop (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845/865 G9 (bsc#1203699).\n- ALSA: hda/realtek: Enable mute/micmute LEDs support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Enable speaker and mute LEDs for HP laptops (bsc#1203699).\n- ALSA: hda/realtek: Fix LED on Zbook Studio G9 (bsc#1203699).\n- ALSA: hda/realtek: Fix mute led issue on thinkpad with cs35l41 s-codec (bsc#1203699).\n- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (bsc#1205100).\n- ALSA: hda/realtek: More robust component matching for CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: hda/realtek: fix speakers for Samsung Galaxy Book Pro (bsc#1205100).\n- ALSA: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes).\n- ALSA: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).\n- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).\n- ALSA: hda/tegra: Add Tegra234 hda driver support (git-fixes).\n- ALSA: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).\n- ALSA: hda/tegra: Update scratch reg. communication (git-fixes).\n- ALSA: hda/tegra: set depop delay for tegra (git-fixes).\n- ALSA: hda: Fix Nvidia dp infoframe (git-fixes).\n- ALSA: hda: Fix dependencies of CS35L41 on SPI/I2C buses (bsc#1203699).\n- ALSA: hda: Fix dependency on ASoC cs35l41 codec (bsc#1203699).\n- ALSA: hda: Fix hang at HD-audio codec unbinding due to refcount saturation (git-fixes).\n- ALSA: hda: Fix position reporting on Poulsbo (git-fixes).\n- ALSA: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).\n- ALSA: hda: cs35l41: Add Amp Name based on channel and index (bsc#1203699).\n- ALSA: hda: cs35l41: Add Boost type flag (bsc#1203699).\n- ALSA: hda: cs35l41: Add Support for Interrupts (bsc#1203699).\n- ALSA: hda: cs35l41: Add calls to newly added test key function (bsc#1203699).\n- ALSA: hda: cs35l41: Add defaulted values into dsp bypass config sequence (bsc#1203699).\n- ALSA: hda: cs35l41: Add initial DSP support and firmware loading (bsc#1203699).\n- ALSA: hda: cs35l41: Add missing default cases (bsc#1203699).\n- ALSA: hda: cs35l41: Add module parameter to control firmware load (bsc#1203699).\n- ALSA: hda: cs35l41: Add support for CS35L41 in HDA systems (bsc#1203699).\n- ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations (bsc#1203699).\n- ALSA: hda: cs35l41: Always configure the DAI (bsc#1203699).\n- ALSA: hda: cs35l41: Avoid overwriting register patch (bsc#1203699).\n- ALSA: hda: cs35l41: Clarify support for CSC3551 without _DSD Properties (bsc#1203699).\n- ALSA: hda: cs35l41: Consolidate selections under SND_HDA_SCODEC_CS35L41 (bsc#1203699).\n- ALSA: hda: cs35l41: Do not dereference fwnode handle (bsc#1203699).\n- ALSA: hda: cs35l41: Drop wrong use of ACPI_PTR() (bsc#1203699).\n- ALSA: hda: cs35l41: Enable GPIO2 Interrupt for CLSA0100 laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Fix I2S params comments (bsc#1203699).\n- ALSA: hda: cs35l41: Fix comments wrt serial-multi-instantiate reference (bsc#1203699).\n- ALSA: hda: cs35l41: Fix error in spi cs35l41 hda driver name (bsc#1203699).\n- ALSA: hda: cs35l41: Handle all external boost setups the same way (bsc#1203699).\n- ALSA: hda: cs35l41: Improve dev_err_probe() messaging (bsc#1203699).\n- ALSA: hda: cs35l41: Make cs35l41_hda_remove() return void (bsc#1203699).\n- ALSA: hda: cs35l41: Make use of the helper function dev_err_probe() (bsc#1203699).\n- ALSA: hda: cs35l41: Move boost config to initialization code (bsc#1203699).\n- ALSA: hda: cs35l41: Move cs35l41* calls to its own symbol namespace (bsc#1203699).\n- ALSA: hda: cs35l41: Move external boost handling to lib for ASoC use (bsc#1203699).\n- ALSA: hda: cs35l41: Mute the device before shutdown (bsc#1203699).\n- ALSA: hda: cs35l41: Put the device into safe mode for external boost (bsc#1203699).\n- ALSA: hda: cs35l41: Read Speaker Calibration data from UEFI variables (bsc#1203699).\n- ALSA: hda: cs35l41: Remove Set Channel Map api from binding (bsc#1203699).\n- ALSA: hda: cs35l41: Remove cs35l41_hda_reg_sequence struct (bsc#1203699).\n- ALSA: hda: cs35l41: Remove suspend/resume hda hooks (bsc#1203699).\n- ALSA: hda: cs35l41: Reorganize log for playback actions (bsc#1203699).\n- ALSA: hda: cs35l41: Save Subsystem ID inside CS35L41 Driver (bsc#1203699).\n- ALSA: hda: cs35l41: Save codec object inside component struct (bsc#1203699).\n- ALSA: hda: cs35l41: Set Speaker Position for CLSA0100 Laptop (bsc#1203699).\n- ALSA: hda: cs35l41: Support CLSA0101 (bsc#1203699).\n- ALSA: hda: cs35l41: Support Firmware switching and reloading (bsc#1203699).\n- ALSA: hda: cs35l41: Support Hibernation during Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support Speaker ID for laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Support System Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support multiple load paths for firmware (bsc#1203699).\n- ALSA: hda: cs35l41: Support reading subsystem id from ACPI (bsc#1203699).\n- ALSA: hda: cs35l41: Tidyup code (bsc#1203699).\n- ALSA: hda: cs35l41: Use the CS35L41 HDA internal define (bsc#1203699).\n- ALSA: hda: cs35l41: fix double free on error in probe() (bsc#1203699).\n- ALSA: hda: fix potential memleak in \u0027add_widget_node\u0027 (git-fixes).\n- ALSA: hda: hda_cs_dsp_ctl: Add Library to support CS_DSP ALSA controls (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add apis to write the controls directly (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add fw id strings (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Ensure pwr_lock is held before reading/writing controls (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Minor clean and redundant code removal (bsc#1203699).\n- ALSA: hda: intel-dsp-config: Add RaptorLake PCI IDs (jsc#PED-720).\n- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).\n- ALSA: hiface: fix repeated words in comments (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: line6: Replace sprintf() with sysfs_emit() (git-fixes).\n- ALSA: line6: remove line6_set_raw declaration (git-fixes).\n- ALSA: oss: Fix potential deadlock at unregistration (git-fixes).\n- ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC (git-fixes).\n- ALSA: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).\n- ALSA: rme9652: use explicitly signed char (git-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett+ 8Pre support (git-fixes).\n- ALSA: scarlett2: Add support for the internal \u0027standalone\u0027 switch (git-fixes).\n- ALSA: scarlett2: Split scarlett2_config_items[] into 3 sections (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).\n- ALSA: usb-audio: Add endianness annotations (git-fixes).\n- ALSA: usb-audio: Add mixer mapping for Gigabyte B450/550 Mobos (git-fixes).\n- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).\n- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).\n- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).\n- ALSA: usb-audio: Add quirk to enable Avid Mbox 3 support (git-fixes).\n- ALSA: usb-audio: Add quirks for M-Audio Fast Track C400/600 (git-fixes).\n- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).\n- ALSA: usb-audio: Fix NULL dererence at error path (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: Fix last interface check for registration (git-fixes).\n- ALSA: usb-audio: Fix potential memory leaks (git-fixes).\n- ALSA: usb-audio: Fix regression with Dell Dock jack detection (bsc#1204719).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Register card at the last interface (git-fixes).\n- ALSA: usb-audio: Remove redundant workaround for Roland quirk (bsc#1205111).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).\n- ALSA: usb-audio: Turn off \u0027manual mode\u0027 on Dell dock (git-fixes).\n- ALSA: usb-audio: Yet more regression for for the delayed card registration (bsc#1205111).\n- ALSA: usb-audio: add quirk to fix Hamedal C20 disconnect issue (git-fixes).\n- ALSA: usb-audio: make read-only array marker static const (git-fixes).\n- ALSA: usb-audio: remove redundant assignment to variable c (git-fixes).\n- ALSA: usb-audio: scarlett2: Use struct_size() helper in scarlett2_usb() (git-fixes).\n- ALSA: usb/6fire: fix repeated words in comments (git-fixes).\n- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).\n- ARM: 9242/1: kasan: Only map modules if CONFIG_KASAN_VMALLOC=n (git-fixes).\n- ARM: 9244/1: dump: Fix wrong pg_level in walk_pmd() (git-fixes).\n- ARM: 9247/1: mm: set readonly for MT_MEMORY_RO with ARM_LPAE (git-fixes).\n- ARM: Drop CMDLINE_* dependency on ATAGS (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).\n- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).\n- ARM: at91: rm9200: fix usb device clock id (git-fixes).\n- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).\n- ARM: decompressor: Include .data.rel.ro.local (git-fixes).\n- ARM: defconfig: clean up multi_v4t and multi_v5 configs (git-fixes).\n- ARM: defconfig: drop CONFIG_PTP_1588_CLOCK=y (git-fixes).\n- ARM: defconfig: drop CONFIG_SERIAL_OMAP references (git-fixes).\n- ARM: defconfig: drop CONFIG_USB_FSL_USB2 (git-fixes).\n- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).\n- ARM: dts: am335x-pcm-953: Define fixed regulators in root node (git-fixes).\n- ARM: dts: am33xx: Fix MMCHS0 dma properties (git-fixes).\n- ARM: dts: armada-38x: Add gpio-ranges for pin muxing (git-fixes).\n- ARM: dts: ast2500-evb: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb: fix board compatible (git-fixes).\n- ARM: dts: at91: sam9g20ek: enable udc vbus gpio pinctrl (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).\n- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).\n- ARM: dts: exynos: correct s5k6a3 reset polarity on Midas family (git-fixes).\n- ARM: dts: exynos: fix polarity of VBUS GPIO of Origen (git-fixes).\n- ARM: dts: fix Moxa SDIO \u0027compatible\u0027, remove \u0027sdhci\u0027 misnomer (git-fixes).\n- ARM: dts: imx6dl: add missing properties for sram (git-fixes).\n- ARM: dts: imx6q-prti6q: Fix ref/tcxo-clock-frequency properties (git-fixes).\n- ARM: dts: imx6q: add missing properties for sram (git-fixes).\n- ARM: dts: imx6qdl-gw59{10,13}: fix user pushbutton GPIO offset (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: fix spi-flash compatible (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: hook up DDC i2c bus (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).\n- ARM: dts: imx6qp: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sl: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sll: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sx: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).\n- ARM: dts: imx6ul: fix csi node compatible (git-fixes).\n- ARM: dts: imx6ul: fix keypad compatible (git-fixes).\n- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).\n- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).\n- ARM: dts: imx7: Fix NAND controller size-cells (git-fixes).\n- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).\n- ARM: dts: imx7d-sdb: config the max pressure for tsc2046 (git-fixes).\n- ARM: dts: imx: align SPI NOR node name with dtschema (git-fixes).\n- ARM: dts: integrator: Tag PCI host with device_type (git-fixes).\n- ARM: dts: kirkwood: lsxl: fix serial line (git-fixes).\n- ARM: dts: kirkwood: lsxl: remove first ethernet port (git-fixes).\n- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).\n- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).\n- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).\n- ARM: dts: turris-omnia: Add label for wan port (git-fixes).\n- ARM: dts: turris-omnia: Fix mpp26 pin name and comment (git-fixes).\n- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).\n- ARM: findbit: fix overflowing offset (git-fixes).\n- ARM: mxs: fix memory leak in mxs_machine_init() (git-fixes).\n- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).\n- ASoC: Intel: bytcht_es8316: Add quirk for the Nanote UMPC-01 (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk variant for LAPBC710 NUC15 (git-fixes).\n- ASoC: SOF: Intel: pci-tgl: add ADL-PS support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-P support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-S support (jsc#PED-652).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: SOF: pci: Change DMI match info to support all Chrome platforms (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: jz4725b: Fix spelling mistake \u0027Sourc\u0027 -\u003e \u0027Source\u0027, \u0027Routee\u0027 -\u003e \u0027Route\u0027 (git-fixes).\n- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).\n- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).\n- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).\n- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: tx-macro: fix kcontrol put (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).\n- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).\n- ASoC: cs35l41: Add ASP TX3/4 source to register patch (bsc#1203699).\n- ASoC: cs35l41: Add bindings for CS35L41 (bsc#1203699).\n- ASoC: cs35l41: Add common cs35l41 enter hibernate function (bsc#1203699).\n- ASoC: cs35l41: Add cs35l51/53 IDs (bsc#1203699).\n- ASoC: cs35l41: Add endianness flag in snd_soc_component_driver (bsc#1203699).\n- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).\n- ASoC: cs35l41: Add support for CLSA3541 ACPI device ID (bsc#1203699).\n- ASoC: cs35l41: Add support for hibernate memory retention mode (bsc#1203699).\n- ASoC: cs35l41: Binding fixes (bsc#1203699).\n- ASoC: cs35l41: CS35L41 Boosted Smart Amplifier (bsc#1203699).\n- ASoC: cs35l41: Change monitor widgets to siggens (bsc#1203699).\n- ASoC: cs35l41: Combine adjacent register writes (bsc#1203699).\n- ASoC: cs35l41: Convert tables to shared source code (bsc#1203699).\n- ASoC: cs35l41: Correct DSP power down (bsc#1203699).\n- ASoC: cs35l41: Correct handling of some registers in the cache (bsc#1203699).\n- ASoC: cs35l41: Correct some control names (bsc#1203699).\n- ASoC: cs35l41: Create shared function for boost configuration (bsc#1203699).\n- ASoC: cs35l41: Create shared function for errata patches (bsc#1203699).\n- ASoC: cs35l41: Create shared function for setting channels (bsc#1203699).\n- ASoC: cs35l41: DSP Support (bsc#1203699).\n- ASoC: cs35l41: Do not overwrite returned error code (bsc#1203699).\n- ASoC: cs35l41: Do not print error when waking from hibernation (bsc#1203699).\n- ASoC: cs35l41: Document CS35l41 External Boost (bsc#1203699).\n- ASoC: cs35l41: Fix DSP mbox start command and global enable order (bsc#1203699).\n- ASoC: cs35l41: Fix GPIO2 configuration (bsc#1203699).\n- ASoC: cs35l41: Fix a bunch of trivial code formating/style issues (bsc#1203699).\n- ASoC: cs35l41: Fix a shift-out-of-bounds warning found by UBSAN (bsc#1203699).\n- ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t (bsc#1203699).\n- ASoC: cs35l41: Fix link problem (bsc#1203699).\n- ASoC: cs35l41: Fix max number of TX channels (bsc#1203699).\n- ASoC: cs35l41: Fix undefined reference to core functions (bsc#1203699).\n- ASoC: cs35l41: Fix use of an uninitialised variable (bsc#1203699).\n- ASoC: cs35l41: Fixup the error messages (bsc#1203699).\n- ASoC: cs35l41: Make cs35l41_remove() return void (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 exit hibernate function into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 fs errata into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_otp_unpack to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_set_cspl_mbox_cmd to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs_dsp config struct into shared code (bsc#1203699).\n- ASoC: cs35l41: Move power initializations to reg_sequence (bsc#1203699).\n- ASoC: cs35l41: Read System Name from ACPI _SUB to identify firmware (bsc#1203699).\n- ASoC: cs35l41: Remove incorrect comment (bsc#1203699).\n- ASoC: cs35l41: Remove unnecessary param (bsc#1203699).\n- ASoC: cs35l41: Set the max SPI speed for the whole device (bsc#1203699).\n- ASoC: cs35l41: Support external boost (bsc#1203699).\n- ASoC: cs35l41: Update handling of test key registers (bsc#1203699).\n- ASoC: cs35l41: Use regmap_read_poll_timeout to wait for OTP boot (bsc#1203699).\n- ASoC: cs42l42: Add control for audio slow-start switch (bsc#1203699).\n- ASoC: cs42l42: Add warnings about DETECT_MODE and PLL_START (bsc#1203699).\n- ASoC: cs42l42: Allow time for HP/ADC to power-up after enable (bsc#1203699).\n- ASoC: cs42l42: Always enable TS_PLUG and TS_UNPLUG interrupts (bsc#1203699).\n- ASoC: cs42l42: Change jack_detect_mutex to a lock of all IRQ handling (bsc#1203699).\n- ASoC: cs42l42: Do not claim to support 192k (bsc#1203699).\n- ASoC: cs42l42: Do not reconfigure the PLL while it is running (bsc#1203699).\n- ASoC: cs42l42: Fix WARN in remove() if running without an interrupt (bsc#1203699).\n- ASoC: cs42l42: Handle system suspend (bsc#1203699).\n- ASoC: cs42l42: Implement Manual Type detection as fallback (bsc#1203699).\n- ASoC: cs42l42: Mark OSC_SWITCH_STATUS register volatile (bsc#1203699).\n- ASoC: cs42l42: Minor fix all errors reported by checkpatch.pl script (bsc#1203699).\n- ASoC: cs42l42: Move CS42L42 register descriptions to general include (bsc#1203699).\n- ASoC: cs42l42: Only report button state if there was a button interrupt (git-fixes).\n- ASoC: cs42l42: Prevent NULL pointer deref in interrupt handler (bsc#1203699).\n- ASoC: cs42l42: Remove redundant pll_divout member (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to DETECT_MODE (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to RS_PLUG/RS_UNPLUG masks (bsc#1203699).\n- ASoC: cs42l42: Remove unused runtime_suspend/runtime_resume callbacks (bsc#1203699).\n- ASoC: cs42l42: Report full jack status when plug is detected (bsc#1203699).\n- ASoC: cs42l42: Report initial jack state (bsc#1203699).\n- ASoC: cs42l42: Reset and power-down on remove() and failed probe() (bsc#1203699).\n- ASoC: cs42l42: Set correct SRC MCLK (bsc#1203699).\n- ASoC: cs42l42: Simplify reporting of jack unplug (bsc#1203699).\n- ASoC: cs42l42: Use PLL for SCLK \u003e 12.288MHz (bsc#1203699).\n- ASoC: cs42l42: Use two thresholds and increased wait time for manual type detection (bsc#1203699).\n- ASoC: cs42l42: free_irq() before powering-down on probe() fail (bsc#1203699).\n- ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() (git-fixes).\n- ASoC: dt-bindings: cs42l42: Convert binding to yaml (bsc#1203699).\n- ASoC: eureka-tlv320: Hold reference returned from of_find_xxx API (git-fixes).\n- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_asrc fsl_esai fsl_sai: allow CONFIG_PM=N (git-fixes).\n- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).\n- ASoC: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).\n- ASoC: fsl_sai: use local device pointer (git-fixes).\n- ASoC: imx-audmux: Silence a clang warning (git-fixes).\n- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).\n- ASoC: imx-card: Fix refcount issue with of_node_put (git-fixes).\n- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).\n- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).\n- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).\n- ASoC: mchp-spdiftx: Fix clang -Wbitfield-constant-conversion (git-fixes).\n- ASoC: mchp-spdiftx: remove references to mchp_i2s_caps (git-fixes).\n- ASoC: mt6359: Fix refcount leak bug (git-fixes).\n- ASoC: mt6359: fix tests for platform_get_irq() failure (git-fixes).\n- ASoC: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe (git-fixes).\n- ASoC: mt6660: Keep the pm_runtime enables before component stuff in mt6660_i2c_probe (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: nau8824: Fix semaphore unbalance at error paths (git-fixes).\n- ASoC: ops: Fix bounds check for _sx controls (git-fixes).\n- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- ASoC: qcom: lpass-cpu: Mark HDMI TX parity register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: mark HDMI TX registers as volatile (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: qcom: sm8250: add missing module owner (git-fixes).\n- ASoC: rsnd: Add check for rsnd_mod_power_on (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).\n- ASoC: rt1019: Fix the TDM settings (git-fixes).\n- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).\n- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).\n- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).\n- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).\n- ASoC: sgtl5000: Reset the CHIP_CLK_CTRL reg on remove (git-fixes).\n- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).\n- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).\n- ASoC: stm32: dfsdm: manage cb buffers cleanup (git-fixes).\n- ASoC: tas2764: Allow mono streams (git-fixes).\n- ASoC: tas2764: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2764: Fix mute/unmute (git-fixes).\n- ASoC: tas2764: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).\n- ASoC: tas2770: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Reinit regcache on reset (git-fixes).\n- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).\n- ASoC: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).\n- ASoC: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).\n- ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).\n- ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).\n- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).\n- ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).\n- ASoC: wm_adsp: Add support for \u0027toggle\u0027 preloaders (bsc#1203699).\n- ASoC: wm_adsp: Add trace caps to speaker protection FW (bsc#1203699).\n- ASoC: wm_adsp: Cancel ongoing work when removing controls (bsc#1203699).\n- ASoC: wm_adsp: Compressed stream DSP memory structs should be __packed (bsc#1203699).\n- ASoC: wm_adsp: Correct control read size when parsing compressed buffer (bsc#1203699).\n- ASoC: wm_adsp: Expand firmware loading search options (bsc#1203699).\n- ASoC: wm_adsp: Fix event for preloader (bsc#1203699).\n- ASoC: wm_adsp: Handle optional legacy support (git-fixes).\n- ASoC: wm_adsp: Introduce cs_dsp logging macros (bsc#1203699).\n- ASoC: wm_adsp: Make compressed buffers optional (bsc#1203699).\n- ASoC: wm_adsp: Minor clean and redundant code removal (bsc#1203699).\n- ASoC: wm_adsp: Move check for control existence (bsc#1203699).\n- ASoC: wm_adsp: Move check of dsp-\u003erunning to better place (bsc#1203699).\n- ASoC: wm_adsp: Move sys_config_size to wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Pass firmware names as parameters when starting DSP core (bsc#1203699).\n- ASoC: wm_adsp: Remove pointless string comparison (bsc#1203699).\n- ASoC: wm_adsp: Remove the wmfw_add_ctl helper function (bsc#1203699).\n- ASoC: wm_adsp: Remove use of snd_ctl_elem_type_t (bsc#1203699).\n- ASoC: wm_adsp: Rename generic DSP support (bsc#1203699).\n- ASoC: wm_adsp: Separate generic cs_dsp_coeff_ctl handling (bsc#1203699).\n- ASoC: wm_adsp: Separate some ASoC and generic functions (bsc#1203699).\n- ASoC: wm_adsp: Separate wm_adsp specifics in cs_dsp_client_ops (bsc#1203699).\n- ASoC: wm_adsp: Split DSP power operations into helper functions (bsc#1203699).\n- ASoC: wm_adsp: Split out struct cs_dsp from struct wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Switch to using wm_coeff_read_ctrl for compressed buffers (bsc#1203699).\n- ASoC: wm_adsp: move firmware loading to client (bsc#1203699).\n- ASoC: wm_adsp: remove a repeated including (bsc#1203699).\n- ASoC: wm_adsp: wm_adsp_control_add() error: uninitialized symbol \u0027ret\u0027 (bsc#1203699).\n- Bluetooth: 6LoWPAN: add missing hci_dev_put() in get_l2cap_conn() (git-fixes).\n- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).\n- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).\n- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).\n- Bluetooth: Fix not cleanup led when bt_init fails (git-fixes).\n- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).\n- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (git-fixes).\n- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).\n- Bluetooth: L2CAP: Fix user-after-free (git-fixes).\n- Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create() (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- Bluetooth: RFCOMM: Fix possible deadlock on socket shutdown/release (git-fixes).\n- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).\n- Bluetooth: SCO: Fix sco_send_frame returning skb-\u003elen (git-fixes).\n- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).\n- Bluetooth: btintel: Mark Intel controller to support LE_STATES quirk (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).\n- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).\n- Bluetooth: btusb: mediatek: fix WMT failure during runtime suspend (git-fixes).\n- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).\n- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).\n- Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (git-fixes).\n- Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure (git-fixes).\n- Bluetooth: virtio_bt: Use skb_put to set length (git-fixes).\n- Decrease the number of SMB3 smbdirect client SGEs (bsc#1193629).\n- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).\n- Documentation: PM: Drop pme_interrupt reference (git-fixes).\n- Documentation: add description for net.core.gro_normal_batch (git-fixes).\n- Documentation: add description for net.sctp.ecn_enable (git-fixes).\n- Documentation: add description for net.sctp.intl_enable (git-fixes).\n- Documentation: add description for net.sctp.reconf_enable (git-fixes).\n- Documentation: devres: add missing I2C helper (git-fixes).\n- Documentation: dm writecache: Render status list as list (git-fixes).\n- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).\n- Documentation: fix udp_wmem_min in ip-sysctl.rst (git-fixes).\n- Documentation: move watch_queue to core-api (git-fixes).\n- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).\n- Drivers: hv: Always reserve framebuffer region for Gen1 VMs (git-fixes).\n- Drivers: hv: Fix syntax errors in comments (git-fixes).\n- Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region (git-fixes).\n- Drivers: hv: fix repeated words in comments (git-fixes).\n- Drivers: hv: remove duplicate word in a comment (git-fixes).\n- Drivers: hv: vmbus: Accept hv_sock offers in isolated guests (git-fixes).\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Do not wait for the ACPI device upon initialization (git-fixes).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix kernel-doc (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).\n- Drivers: hv: vmbus: Optimize vmbus_on_event (git-fixes).\n- Drivers: hv: vmbus: Release cpu lock in error case (git-fixes).\n- Drivers: hv: vmbus: Use PCI_VENDOR_ID_MICROSOFT for better discoverability (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: fix typo in comment (git-fixes).\n- EDAC/dmc520: Do not print an error for each unconfigured interrupt line (bsc#1190497).\n- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).\n- Enable livepatching related packages on -RT (jsc#PED-1706)\n- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).\n- HID: add Lenovo Yoga C630 battery quirk (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: amd_sfh: Add NULL check for hid device (git-fixes).\n- HID: amd_sfh: Handle condition of \u0027no sensors\u0027 (git-fixes).\n- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).\n- HID: core: fix shift-out-of-bounds in hid_report_raw_event (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: hid-input: add Surface Go battery quirk (git-fixes).\n- HID: hid-lg4ff: Add check for empty lbuf (git-fixes).\n- HID: hidraw: fix memory leak in hidraw_release() (git-fixes).\n- HID: hyperv: fix possible memory leak in mousevsc_probe() (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- HID: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).\n- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).\n- HID: multitouch: Add memory barriers (git-fixes).\n- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).\n- HID: playstation: add initial DualSense Edge controller support (git-fixes).\n- HID: roccat: Fix use-after-free in roccat_read() (git-fixes).\n- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).\n- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).\n- HID: usbhid: Add ALWAYS_POLL quirk for some mice (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- HSI: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).\n- HSI: omap_ssi_port: Fix dma_map_sg error check (git-fixes).\n- Handle variable number of SGEs in client smbdirect send (bsc#1193629).\n- IB/core: Fix a nested dead lock as part of ODP flow (git-fixes)\n- IB/hfi1: Correctly move list in sc_disable() (git-fixes)\n- IB/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes)\n- IB: Set IOVA/LENGTH on IB_MR in core/uverbs layers (git-fixes)\n- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).\n- Input: goodix - add compatible string for GT1158 (git-fixes).\n- Input: goodix - add support for GT1158 (git-fixes).\n- Input: goodix - try resetting the controller when no config is set (git-fixes).\n- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).\n- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - fix leaking of platform device on module removal (git-fixes).\n- Input: i8042 - fix refount leak on sparc (git-fixes).\n- Input: i8042 - merge quirk tables (git-fies).\n- Input: i8042 - move __initconst to fix code styling warning (git-fies).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: iforce - invert valid length check when fetching device IDs (git-fixes).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: iqs62x-keys - drop unused device node references (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- Input: soc_button_array - add Acer Switch V 10 to dmi_use_low_level_irq[] (git-fixes).\n- Input: soc_button_array - add use_low_level_irq module parameter (git-fixes).\n- Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode (git-fixes).\n- Input: synaptics-rmi4 - fix firmware update operations with bootloader v8 (git-fixes).\n- Input: xpad - add supported devices as contributed on github (git-fixes).\n- Input: xpad - fix wireless 360 controller breaking after suspend (git-fixes).\n- KABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).\n- KVM-x86-Avoid-theoretical-NULL-pointer-dereference-i.patch\n- KVM-x86-Check-lapic_in_kernel-before-attempting-to-s.patch\n- KVM-x86-Forbid-VMM-to-set-SYNIC-STIMER-MSRs-when-Syn.patch\n- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).\n- KVM: MMU: shadow nested paging does not have PKU (git-fixes).\n- KVM: Move wiping of the kvm-\u003evcpus array to common code (git-fixes).\n- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).\n- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: SEV: Mark nested locking of vcpu-\u003elock (git-fixes).\n- KVM: SVM: Create a separate mapping for the GHCB save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Create a separate mapping for the SEV-ES save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Define sev_features and VMPL field in the VMSA (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Disable SEV-ES support if MMIO caching is disable (git-fixes).\n- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).\n- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).\n- KVM: SVM: Exit to userspace on ENOMEM/EFAULT GHCB errors (git-fixes).\n- KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is supported (git-fixes).\n- KVM: SVM: Unwind \u0027speculative\u0027 RIP advancement if INTn injection \u0027fails\u0027 (git-fixes).\n- KVM: SVM: Update the SEV-ES save area mapping (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: adjust register allocation for __svm_vcpu_run() (git-fixes).\n- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).\n- KVM: SVM: fix tsc scaling cache logic (bsc#1203263).\n- KVM: SVM: move guest vmsave/vmload back to assembly (git-fixes).\n- KVM: SVM: replace regs argument of __svm_vcpu_run() with vcpu_svm (git-fixes).\n- KVM: SVM: retrieve VMCB from assembly (git-fixes).\n- KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL (git-fixes).\n- KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS (git-fixes).\n- KVM: VMX: Heed the \u0027msr\u0027 argument in msr_write_intercepted() (git-fixes).\n- KVM: VMX: Inject #PF on ENCLS as \u0027emulated\u0027 #PF (git-fixes).\n- KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there\u0027s no vPMU (git-fixes).\n- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).\n- KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled (bsc#1205007).\n- KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable (git-fixes).\n- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).\n- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).\n- KVM: X86: Fix when shadow_root_level=5 \u0026\u0026 guest root_level\u0026lt;4 (git-fixes).\n- KVM: X86: Use vcpu-\u003earch.walk_mmu for kvm_mmu_invlpg() (git-fixes).\n- KVM: X86: avoid uninitialized \u0027fault.async_page_fault\u0027 from fixed-up #PF (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: fix avic_set_running for preemptable kernels (git-fixes).\n- KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1 (git-fixes).\n- KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists (git-fixes).\n- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).\n- KVM: nVMX: Ignore SIPI that arrives in L2 when vCPU is not in WFS (git-fixes).\n- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}() (git-fixes).\n- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).\n- KVM: nVMX: Unconditionally purge queued/injected events on nested \u0027exit\u0027 (git-fixes).\n- KVM: nVMX: do not use vcpu-\u003earch.efer when checking host state on nested state load (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes jsc#PED-611).\n- KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes jsc#PED-611).\n- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).\n- KVM: s390: pv: do not present the ecall interrupt twice (bsc#1203229 LTC#199905).\n- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).\n- KVM: s390x: fix SCK locking (git-fixes).\n- KVM: selftests: Make sure kvm_create_max_vcpus test won\u0027t hit RLIMIT_NOFILE (git-fixes).\n- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).\n- KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes).\n- KVM: x86/mmu: Do not advance iterator after restart due to yielding (git-fixes).\n- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).\n- KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap (git-fixes).\n- KVM: x86/mmu: Move \u0027invalid\u0027 check out of kvm_tdp_mmu_get_root() (git-fixes).\n- KVM: x86/mmu: Retry page fault if root is invalidated by memslot update (git-fixes).\n- KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non-atomic path (git-fixes).\n- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).\n- KVM: x86/mmu: fix memoryleak in kvm_mmu_vendor_module_init() (git-fixes).\n- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).\n- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).\n- KVM: x86/pmu: Add pmc-\u003eintr to refactor kvm_perf_overflow{_intr}() (git-fixes).\n- KVM: x86/pmu: Do not truncate the PerfEvtSeln MSR when creating a perf event (git-fixes).\n- KVM: x86/pmu: Fix and isolate TSX-specific performance event logic (git-fixes).\n- KVM: x86/pmu: Fix available_event_types check for REF_CPU_CYCLES event (git-fixes).\n- KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).\n- KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog (git-fixes).\n- KVM: x86/pmu: Use different raw event masks for AMD and Intel (git-fixes).\n- KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id (git-fixes).\n- KVM: x86: Add KVM_CAP_ENABLE_CAP to x86 (git-fixes).\n- KVM: x86: Add compat handler for KVM_X86_SET_MSR_FILTER (git-fixes).\n- KVM: x86: Always set kvm_run-\u003eif_flag (git-fixes).\n- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).\n- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).\n- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn\u0027t activated (git-fixes).\n- KVM: x86: Forcibly leave nested virt when SMM state is toggled (git-fixes).\n- KVM: x86: Fully initialize \u0027struct kvm_lapic_irq\u0027 in kvm_pv_kick_cpu_op() (git-fixes).\n- KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest (git-fixes).\n- KVM: x86: Inject #UD on emulated XSETBV if XSAVES isn\u0027t enabled (git-fixes).\n- KVM: x86: Keep MSR_IA32_XSS unchanged for INIT (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000001H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000006H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000008H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.8000001AH (git-fixes).\n- KVM: x86: Move lookup of indexed CPUID leafs to helper (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: x86: Register perf callbacks after calling vendor\u0027s hardware_setup() (git-fixes).\n- KVM: x86: Report error when setting CPUID if Hyper-V allocation fails (git-fixes).\n- KVM: x86: Retry page fault if MMU reload is pending and root has no sp (bsc#1205744).\n- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT \u0026\u0026 !gCR0.PG case (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS) (git-fixes).\n- KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time (git-fixes).\n- KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1) (git-fixes).\n- KVM: x86: Update vPMCs when retiring branch instructions (git-fixes).\n- KVM: x86: Update vPMCs when retiring instructions (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits (git-fixes).\n- KVM: x86: avoid loading a vCPU after .vm_destroy was called (git-fixes).\n- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).\n- KVM: x86: do not report preemption if the steal time cache is stale (git-fixes).\n- KVM: x86: emulator: em_sysexit should update ctxt-\u003emode (git-fixes).\n- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).\n- KVM: x86: emulator: update the emulation mode after CR0 write (git-fixes).\n- KVM: x86: emulator: update the emulation mode after rsm (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_flush_tlb() (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_send_ipi() (git-fixes).\n- KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercall (git-fixes).\n- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).\n- KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSM (git-fixes).\n- KVM: x86: nSVM: fix potential NULL derefernce on nested migration (git-fixes).\n- KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved state (git-fixes).\n- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).\n- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).\n- KVM: x86: use a separate asm-offsets.c file (git-fixes).\n- MIPS: Loongson: Use hwmon_device_register_with_groups() to register hwmon (git-fixes).\n- NFC: nci: Bounds check struct nfc_target arrays (git-fixes).\n- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).\n- NFS: Fix WARN_ON due to unionization of nfs_inode.nrequests (git-fixes).\n- NFS: Fix another fsync() issue after a server reboot (git-fixes).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Clean up the show_nf_flags() macro (git-fixes).\n- NFSD: Fix NFSv3 SETATTR/CREATE\u0027s handling of large file sizes (git-fixes).\n- NFSD: Fix ia_size underflow (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NFSD: restore EINVAL error translation in nfsd_commit() (git-fixes).\n- NFSv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFSv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFSv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFSv4.2 fix problems with __nfs42_ssc_open (git-fixes).\n- NFSv4.2: Update mode bits after ALLOCATE and DEALLOCATE (git-fixes).\n- NFSv4: Fix races in the legacy idmapper upcall (git-fixes).\n- NFSv4: Fixes for nfs4_inode_return_delegation() (git-fixes).\n- NFSv4: Turn off open-by-filehandle and NFS re-export for NFSv4.0 (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/AER: Iterate over error counters instead of error strings (git-fixes).\n- PCI/ASPM: Correct LTR_L1.2_THRESHOLD computation (git-fixes).\n- PCI/ASPM: Ignore L1 PM Substates if device lacks capability (git-fixes).\n- PCI/ASPM: Make Intel DG2 L1 acceptable latency unlimited (jsc#PED-387).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: Correct misspelled words (git-fixes).\n- PCI: Disable MSI for Tegra234 Root Ports (git-fixes).\n- PCI: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes).\n- PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h (git-fixes).\n- PCI: Prefer \u0027unsigned int\u0027 over bare \u0027unsigned\u0027 (git-fixes).\n- PCI: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes).\n- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if \u0027snps,enable-cdm-check\u0027 exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).\n- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (git-fixes).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- PCI: mediatek-gen3: Change driver name to mtk-pcie-gen3 (git-fixes).\n- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).\n- PM: domains: Fix handling of unavailable/disabled idle states (git-fixes).\n- PM: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).\n- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).\n- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)\n- RDMA/cm: Use SLID in the work completion as the DLID in responder side (git-fixes)\n- RDMA/cma: Fix arguments order in net device validation (git-fixes)\n- RDMA/cma: Use output interface for net_dev check (git-fixes)\n- RDMA/core: Fix null-ptr-deref in ib_core_cleanup() (git-fixes)\n- RDMA/hfi1: Fix potential integer multiplication overflow errors (git-fixes)\n- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)\n- RDMA/hfi1: Prevent use of lock before it is initialized (git-fixes)\n- RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (git-fixes)\n- RDMA/hns: Add the detection for CMDQ status in the device initialization process (git-fixes)\n- RDMA/hns: Correct the type of variables participating in the shift operation (git-fixes)\n- RDMA/hns: Disable local invalidate operation (git-fixes)\n- RDMA/hns: Fix incorrect clearing of interrupt status register (git-fixes)\n- RDMA/hns: Fix supported page size (git-fixes)\n- RDMA/hns: Fix wrong fixed value of qp-\u003erq.wqe_shift (git-fixes)\n- RDMA/hns: Remove magic number (git-fixes)\n- RDMA/hns: Remove the num_cqc_timer variable (git-fixes)\n- RDMA/hns: Remove the num_qpc_timer variable (git-fixes)\n- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)\n- RDMA/hns: Replace tab with space in the right-side comments (git-fixes)\n- RDMA/hns: Use hr_reg_xxx() instead of remaining roce_set_xxx() (git-fixes)\n- RDMA/irdma: Add support for address handle re-use (git-fixes)\n- RDMA/irdma: Align AE id codes to correct flush code and event (git-fixes)\n- RDMA/irdma: Do not advertise 1GB page size for x722 (git-fixes)\n- RDMA/irdma: Fix VLAN connection with wildcard address (git-fixes)\n- RDMA/irdma: Fix a window for use-after-free (git-fixes)\n- RDMA/irdma: Fix deadlock in irdma_cleanup_cm_core() (git-fixes)\n- RDMA/irdma: Fix setting of QP context err_rq_idx_valid field (git-fixes)\n- RDMA/irdma: Fix sleep from invalid context BUG (git-fixes)\n- RDMA/irdma: Move union irdma_sockaddr to header file (git-fixes)\n- RDMA/irdma: Remove the unnecessary variable saddr (git-fixes)\n- RDMA/irdma: Report RNR NAK generation in device caps (git-fixes)\n- RDMA/irdma: Report the correct max cqes from query device (git-fixes)\n- RDMA/irdma: Return correct WC error for bind operation failure (git-fixes)\n- RDMA/irdma: Return error on MR deregister CQP failure (git-fixes)\n- RDMA/irdma: Use net_type to check network type (git-fixes)\n- RDMA/irdma: Use s/g array in post send only when its valid (git-fixes)\n- RDMA/irdma: Validate udata inlen and outlen (git-fixes)\n- RDMA/mlx5: Add missing check for return value in get namespace flow (git-fixes)\n- RDMA/mlx5: Do not compare mkey tags in DEVX indirect mkey (git-fixes)\n- RDMA/mlx5: Set local port to one when accessing counters (git-fixes)\n- RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)\n- RDMA/qedr: Fix reporting QP timeout attribute (git-fixes)\n- RDMA/qedr: clean up work queue on failure in qedr_alloc_resources() (git-fixes)\n- RDMA/rtrs-clt: Use the right sg_cnt after ib_dma_map_sg (git-fixes)\n- RDMA/rtrs-srv: Fix modinfo output for stringify (git-fixes)\n- RDMA/rxe: Fix \u0027kernel NULL pointer dereference\u0027 error (git-fixes)\n- RDMA/rxe: Fix deadlock in rxe_do_local_ops() (git-fixes)\n- RDMA/rxe: Fix error unwind in rxe_create_qp() (git-fixes)\n- RDMA/rxe: Fix mw bind to allow any consumer key portion (git-fixes)\n- RDMA/rxe: Fix resize_finish() in rxe_queue.c (git-fixes)\n- RDMA/rxe: Fix rnr retry behavior (git-fixes)\n- RDMA/rxe: Fix the error caused by qp-\u003esk (git-fixes)\n- RDMA/rxe: For invalidate compare according to set keys in mr (git-fixes)\n- RDMA/rxe: Generate a completion for unsupported/invalid opcode (git-fixes)\n- RDMA/rxe: Limit the number of calls to each tasklet (git-fixes)\n- RDMA/rxe: Remove useless pkt parameters (git-fixes)\n- RDMA/siw: Always consume all skbuf data in sk_data_ready() upcall. (git-fixes)\n- RDMA/siw: Fix QP destroy to wait for all references dropped. (git-fixes)\n- RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event (git-fixes)\n- RDMA/siw: Pass a pointer to virt_to_page() (git-fixes)\n- RDMA/srp: Fix srp_abort() (git-fixes)\n- RDMA/srp: Handle dev_set_name() failure (git-fixes)\n- RDMA/srp: Rework the srp_add_port() error path (git-fixes)\n- RDMA/srp: Set scmnd-\u003eresult only when scmnd is not NULL (git-fixes)\n- RDMA/srp: Support more than 255 rdma ports (git-fixes)\n- RDMA/srp: Use the attribute group mechanism for sysfs attributes (git-fixes)\n- RDMA/srpt: Duplicate port name members (git-fixes)\n- RDMA/srpt: Fix a use-after-free (git-fixes)\n- RDMA/srpt: Introduce a reference count in struct srpt_device (git-fixes)\n- RDMA/usnic: fix set-but-not-unused variable \u0027flags\u0027 warning (git-fixes)\n- RDMA: remove useless condition in siw_create_cq() (git-fixes)\n- Reduce client smbdirect max receive segment size (bsc#1193629).\n- Refresh nvme in-band authentication patches (bsc#1199086)\n- Refresh patches.suse/iommu-vt-d-Acquiring-lock-in-domain-ID-allocation-helpers Fix spin deadlock in intel_iommu (bsc#1203505)\n- Refresh patches.suse/iwlwifi-module-firmware-ucode-fix.patch (bsc#1202131) Now iwlwifi queries *-72.ucode, but again, this is non-existing version. Correct to the existing *-71.ucode\n- Refresh patches.suse/ppc64-kdump-Limit-kdump-base-to-512MB.patch to upstream version.\n- Remove doubly applied amdgpu patches\n- Replace the in-house patch by the above upstream version, patches.suse/md-raid0-fix-buffer-overflow-at-debug-print.patch.\n- Revert \u0027ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations\u0027 (bsc#1203699).\n- Revert \u0027ALSA: usb-audio: Split endpoint setups for hw_params and prepare\u0027 (git-fixes).\n- Revert \u0027SUNRPC: Remove unreachable error condition\u0027 (git-fixes).\n- Revert \u0027arm64: Mitigate MTE issues with str{n}cmp()\u0027 (git-fixes)\n- Revert \u0027clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops\u0027 (git-fixes).\n- Revert \u0027constraints: increase disk space for all architectures\u0027 (bsc#1203693). This reverts commit 43a9011f904bc7328d38dc340f5e71aecb6b19ca.\n- Revert \u0027crypto: qat - reduce size of mapped region\u0027 (git-fixes).\n- Revert \u0027drivers/video/backlight/platform_lcd.c: add support for device tree based probe\u0027 (git-fixes).\n- Revert \u0027drm/amdgpu: use dirty framebuffer helper\u0027 (git-fixes).\n- Revert \u0027drm/i915: Hold reference to intel_context over life of i915_request\u0027 (git-fixes).\n- Revert \u0027drm/udl: Kill pending URBs at suspend and disconnect\u0027 (bsc#1195917).\n- Revert \u0027drm/vc4: hvs: Reset muxes at probe time (git-fixes).\u0027 (bsc#1202341) This reverts commit 303122d0f2160411fa1068220bc59849d848550d. The reverted change clears hardware state on the RPi4, which leaves the screen blank. Without it, the display works correctly.\n- Revert \u0027drm: bridge: analogix/dp: add panel prepare/unprepare in suspend/resume time\u0027 (git-fixes).\n- Revert \u0027firmware: arm_scmi: Add clock management to the SCMI power domain\u0027 (git-fixes).\n- Revert \u0027ice: Hide bus-info in ethtool for PRs in switchdev mode\u0027 (git-fixes).\n- Revert \u0027ipv6: Honor all IPv6 PIO Valid Lifetime values\u0027 (bsc#1202989).\n- Revert \u0027net: phy: meson-gxl: improve link-up behavior\u0027 (git-fixes).\n- Revert \u0027net: usb: ax88179_178a needs FLAG_SEND_ZLP\u0027 (git-fixes).\n- Revert \u0027pNFS: nfs3_set_ds_client should set NFS_CS_NOPING\u0027 (git-fixes).\n- Revert \u0027powerpc/rtas: Implement reentrant rtas call\u0027 (bsc#1203664 ltc#199236).\n- Revert \u0027scripts/mod/modpost.c: permit \u0027.cranges\u0027 secton for sh64 architecture.\u0027 (git-fixes).\n- Revert \u0027tty: n_gsm: avoid call of sleeping functions from atomic context\u0027 (git-fixes).\n- Revert \u0027tty: n_gsm: replace kicktimer with delayed_work\u0027 (git-fixes).\n- Revert \u0027usb: add quirks for Lenovo OneLink+ Dock\u0027 (git-fixes).\n- Revert \u0027usb: dwc3: disable USB core PHY management\u0027 (git-fixes).\n- Revert \u0027usb: gadget: udc-xilinx: replace memcpy with memcpy_toio\u0027 (git-fixes).\n- Revert \u0027usb: storage: Add quirk for Samsung Fit flash\u0027 (git-fixes).\n- Revert \u0027workqueue: remove unused cancel_work()\u0027 (bsc#1204933).\n- Revert \u0027x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV\u0027 (bsc#1190497).\n- Revert selftest patches that have been reverted in stable-5.15.y\n- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).\n- SMB3: fix lease break timeout when multiple deferred close handles for the same file (bsc#1193629).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: Fix NFSD\u0027s request deferral on RDMA transports (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Fix xdr_encode_bool() (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- SUNRPC: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- USB: Fix ehci infinite suspend-resume loop issue in zhaoxin (git-fixes).\n- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).\n- USB: bcma: Make GPIO explicitly optional (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: console: move mutex_unlock() before usb_serial_put() (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add Quectel RM520N (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID (git-fixes).\n- USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).\n- XArray: Update the LRU list in xas_split() (git-fixes).\n- add another bug reference to some hyperv changes (bsc#1205617).\n- apparmor: Fix failed mount permission check error message (git-fixes).\n- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).\n- apparmor: fix aa_label_asxprint return check (git-fixes).\n- apparmor: fix absroot causing audited secids to begin with = (git-fixes).\n- apparmor: fix overlapping attachment computation (git-fixes).\n- apparmor: fix quiet_denied for file rules (git-fixes).\n- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).\n- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).\n- arcnet: fix potential memory leak in com20020_probe() (git-fixes).\n- arm64/bti: Disable in kernel BTI when cross section thunks are broken (git-fixes)\n- arm64/mm: Consolidate TCR_EL1 fields (git-fixes).\n- arm64/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).\n- arm64: Add AMPERE1 to the Spectre-BHB affected list (git-fixes).\n- arm64: Do not forget syscall when starting a new thread (git-fixes).\n- arm64: Fix bit-shifting UB in the MIDR_CPU_MODEL() macro (git-fixes)\n- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).\n- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).\n- arm64: dts: imx8: correct clock order (git-fixes).\n- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mn: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mp: Add snps,gfladj-refclk-lpm-sel quirk to USB nodes (git-fixes).\n- arm64: dts: imx8mq-librem5: Add bq25895 as max17055\u0027s power supply (git-fixes).\n- arm64: dts: juno: Add thermal critical trip points (git-fixes).\n- arm64: dts: ls1088a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: ls208xa: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: lx2160a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).\n- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).\n- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).\n- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).\n- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).\n- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).\n- arm64: dts: qcom: sa8155p-adp: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sc7280: Cleanup the lpasscc node (git-fixes).\n- arm64: dts: qcom: sm8150-xperia-kumano: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250-xperia-edo: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).\n- arm64: dts: qcom: sm8350-hdk: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8350: fix UFS PHY serdes size (git-fixes).\n- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).\n- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).\n- arm64: dts: rockchip: Fix typo in lisense text for PX30.Core (git-fixes).\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes).\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes).\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes).\n- arm64: dts: rockchip: add enable-strobe-pulldown to emmc phy on nanopi4 (git-fixes).\n- arm64: dts: rockchip: lower rk3399-puma-haikou SD controller clock frequency (git-fixes).\n- arm64: dts: ti: k3-j7200: fix main pinmux range (git-fixes).\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).\n- arm64: efi: Fix handling of misaligned runtime regions and drop warning (git-fixes).\n- arm64: entry: avoid kprobe recursion (git-fixes).\n- arm64: errata: Add Cortex-A510 to the repeat tlbi list (git-fixes) Enable this errata fix configuration option to arm64/default.\n- arm64: errata: Add Cortex-A55 to the repeat tlbi list (git-fixes). Enable CONFIG_ARM64_ERRATUM_2441007, too\n- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes) Enable CONFIG_ARM64_ERRATUM_1742098 in arm64/default\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).\n- arm64: fix rodata=full (git-fixes).\n- arm64: fix rodata=full again (git-fixes)\n- arm64: ftrace: fix module PLTs with mcount (git-fixes).\n- arm64: kasan: Revert \u0027arm64: mte: reset the page tag in page-\u003eflags\u0027 (git-fixes).\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: lib: Import latest version of Arm Optimized Routines\u0027 strcmp (git-fixes)\n- arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored (git-fixes).\n- arm64: select TRACE_IRQFLAGS_NMI_SUPPORT (git-fixes)\n- arm64: set UXN on swapper page tables (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).\n- arm64: tegra: Fixup SYSRAM references (git-fixes).\n- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).\n- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).\n- arm64: topology: fix possible overflow in amu_fie_setup() (git-fixes).\n- arm64: topology: move store_cpu_topology() to shared code (git-fixes).\n- arm_pmu: Validate single/group leader events (git-fixes).\n- asm-generic: remove a broken and needless ifdef conditional (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ata: ahci-imx: Fix MODULE_ALIAS (git-fixes).\n- ata: fix ata_id_has_devslp() (git-fixes).\n- ata: fix ata_id_has_dipm() (git-fixes).\n- ata: fix ata_id_has_ncq_autosense() (git-fixes).\n- ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting() (git-fixes).\n- ata: libahci_platform: Sanity check the DT child nodes number (git-fixes).\n- ata: libata-core: do not issue non-internal commands once EH is pending (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ata: libata-scsi: fix SYNCHRONIZE CACHE (16) command failure (git-fixes).\n- ata: libata-scsi: simplify __ata_scsi_queuecmd() (git-fixes).\n- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).\n- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath11k: Fix incorrect debug_mask mappings (git-fixes).\n- ath11k: fix netdev open race (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).\n- audit: fix undefined behavior in bit shift for AUDIT_BIT (git-fixes).\n- ax25: Fix ax25 session cleanup problems (git-fixes).\n- batman-adv: Fix hang up with small MTU hard-interface (git-fixes).\n- bitfield.h: Fix \u0027type of reg too small for mask\u0027 test (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (git-fixes).\n- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).\n- blk-mq: do not create hctx debugfs dir until q-\u003edebugfs_dir is created (git-fixes).\n- blk-mq: fix io hung due to missing commit_rqs (git-fixes).\n- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block/rnbd-srv: Set keep_id to true after mutex_trylock (git-fixes).\n- block: Do not reread partition table on exclusively open device (bsc#1190969).\n- block: Fix fsync always failed if once failed (bsc#1202779).\n- block: Fix wrong offset in bio_truncate() (bsc#1202780).\n- block: add bio_start_io_acct_time() to control start_time (git-fixes).\n- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).\n- block: drop unused includes in \u0026lt;linux/genhd.h\u003e (git-fixes).\n- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).\n- block: only mark bio as tracked if it really is tracked (bsc#1202782).\n- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).\n- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).\n- bnx2x: fix built-in kernel driver load failure (git-fixes).\n- bnx2x: fix driver load from initrd (git-fixes).\n- bnxt_en: Fix bnxt_refclk_read() (git-fixes).\n- bnxt_en: Fix bnxt_reinit_after_abort() code path (git-fixes).\n- bnxt_en: fix livepatch query (git-fixes).\n- bnxt_en: reclaim max resources if sriov enable fails (git-fixes).\n- bonding: 802.3ad: fix no transmission of LACPDUs (git-fixes).\n- bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers (git-fixes).\n- bridge: switchdev: Fix memory leaks when changing VLAN protocol (git-fixes).\n- btrfs-fix-deadlock-between-quota-enable-and-other-qu.patch: (bsc#1205521).\n- btrfs: check if root is readonly while setting security xattr (bsc#1206147).\n- btrfs: do not allow compression on nodatacow files (bsc#1206149).\n- btrfs: export a helper for compression hard check (bsc#1206149).\n- btrfs: fix processing of delayed data refs during backref walking (bsc#1206056).\n- btrfs: fix processing of delayed tree block refs during backref walking (bsc#1206057).\n- btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() (bsc#1203360).\n- btrfs: fix space cache corruption and potential double allocations (bsc#1203361).\n- btrfs: prevent subvol with swapfile from being deleted (bsc#1206035).\n- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).\n- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1206036).\n- btrfs: send: fix failures when processing inodes with no links (bsc#1206036).\n- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1206036).\n- btrfs: send: fix sending link commands for existing file paths (bsc#1206036).\n- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1206036).\n- btrfs: send: refactor arguments of get_inode_info() (bsc#1206036).\n- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1206036).\n- btrfs: send: remove unused type parameter to iterate_inode_ref_t (bsc#1206036).\n- btrfs: send: use boolean types for current inode status (bsc#1206036).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- bus: sunxi-rsb: Remove the shutdown callback (git-fixes).\n- bus: sunxi-rsb: Support atomic transfers (git-fixes).\n- ca8210: Fix crash by zero initializing data (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: af_can: fix NULL pointer dereference in can_rx_register() (git-fixes).\n- can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).\n- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).\n- can: do not increase rx statistics when generating a CAN rx error message frame (git-fixes).\n- can: do not increase rx_bytes statistics for RTR frames (git-fixes).\n- can: ems_usb: fix clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: etas_es58x: es58x_init_netdev(): free netdev when register_candev() (git-fixes).\n- can: gs_usb: gs_can_open(): fix race dev-\u003ecan.state condition (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: j1939: j1939_send_one(): fix missing CAN header initialization (git-fixes).\n- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).\n- can: j1939: transport: j1939_session_skb_drop_old(): spin_unlock_irqrestore() before kfree_skb() (git-fixes).\n- can: kvaser_usb: Fix possible completions during init_completion (git-fixes).\n- can: kvaser_usb: Fix use of uninitialized completion (git-fixes).\n- can: kvaser_usb: kvaser_usb_leaf: fix CAN clock frequency regression (git-fixes).\n- can: kvaser_usb: make use of units.h in assignment of frequency (git-fixes).\n- can: kvaser_usb: replace run-time checks with struct kvaser_usb_driver_info (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).\n- can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: m_can: Add check for devm_clk_get (git-fixes).\n- can: m_can: fix typo prescalar -\u003e prescaler (git-fixes).\n- can: m_can: is_lec_err(): clean up LEC error handling (git-fixes).\n- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (git-fixes).\n- can: mcp251x: Fix race condition on receive interrupt (git-fixes).\n- can: mcp251x: mcp251x_can_probe(): add missing unregister_candev() in error path (git-fixes).\n- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix endianness conversion (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): use correct length to read dev_id (git-fixes).\n- can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error path (git-fixes).\n- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).\n- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: rx-offload: can_rx_offload_init_queue(): fix typo (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- capabilities: fix potential memleak on error path from vfs_getxattr_alloc() (git-fixes).\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).\n- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1206050).\n- ceph: avoid putting the realm twice when decoding snaps fails (bsc#1206051).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).\n- ceph: do not truncate file in atomic_open (bsc#1202824).\n- ceph: do not update snapshot context when there is no new snapshot (bsc#1206047).\n- ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1206048).\n- ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1206049).\n- ceph: properly handle statfs on multifs setups (bsc#1206045).\n- ceph: switch netfs read ops to use rreq-\u003einode instead of rreq-\u003emapping-\u003ehost (bsc#1206046).\n- ceph: use correct index when encoding client supported features (bsc#1202822).\n- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).\n- cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).\n- cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() (bsc#1196869).\n- cgroup: Fix race condition at rebind_subsystems() (bsc#1203902).\n- cgroup: Fix threadgroup_rwsem \u0026lt;-\u003e cpus_read_lock() deadlock (bsc#1196869).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- char: tpm: Protect tpm_pm_suspend with locks (git-fixes).\n- cifs: Add constructor/destructors for tcon-\u003ecfid (bsc#1193629).\n- cifs: Add helper function to check smb1+ server (bsc#1193629).\n- cifs: Do not access tcon-\u003ecfids-\u003ecfid directly from is_path_accessible (bsc#1193629).\n- cifs: Do not use tcon-\u003ecfid directly, use the cfid we get from open_cached_dir (bsc#1193629).\n- cifs: Fix connections leak when tlink setup failed (git-fixes).\n- cifs: Fix memory leak on the deferred close (bsc#1193629).\n- cifs: Fix memory leak when build ntlmssp negotiate blob failed (bsc#1193629).\n- cifs: Fix pages array leak when writedata alloc failed in cifs_writedata_alloc() (bsc#1193629).\n- cifs: Fix pages leak when writedata alloc failed in cifs_write_from_iter() (bsc#1193629).\n- cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message (bsc#1193629).\n- cifs: Fix wrong return value checking when GETFLAGS (git-fixes).\n- cifs: Fix xid leak in cifs_copy_file_range() (bsc#1193629).\n- cifs: Fix xid leak in cifs_create() (bsc#1193629).\n- cifs: Fix xid leak in cifs_flock() (bsc#1193629).\n- cifs: Fix xid leak in cifs_get_file_info_unix() (bsc#1193629).\n- cifs: Fix xid leak in cifs_ses_add_channel() (bsc#1193629).\n- cifs: Make tcon contain a wrapper structure cached_fids instead of cached_fid (bsc#1193629).\n- cifs: Move cached-dir functions into a separate file (bsc#1193629).\n- cifs: Replace a couple of one-element arrays with flexible-array members (bsc#1193629).\n- cifs: Use after free in debug code (git-fixes).\n- cifs: Use help macro to get the header preamble size (bsc#1193629).\n- cifs: Use help macro to get the mid header size (bsc#1193629).\n- cifs: add check for returning value of SMB2_close_init (git-fixes).\n- cifs: add check for returning value of SMB2_set_info_init (git-fixes).\n- cifs: add missing spinlock around tcon refcount (bsc#1193629).\n- cifs: alloc_mid function should be marked as static (bsc#1193629).\n- cifs: always initialize struct msghdr smb_msg completely (bsc#1193629).\n- cifs: always iterate smb sessions using primary channel (bsc#1193629).\n- cifs: avoid deadlocks while updating iface (bsc#1193629).\n- cifs: avoid unnecessary iteration of tcp sessions (bsc#1193629).\n- cifs: avoid use of global locks for high contention data (bsc#1193629).\n- cifs: cache the dirents for entries in a cached directory (bsc#1193629).\n- cifs: change iface_list from array to sorted linked list (bsc#1193629).\n- cifs: destage dirty pages before re-reading them for cache=none (bsc#1193629).\n- cifs: do not send down the destination address to sendmsg for a SOCK_STREAM (bsc#1193629).\n- cifs: drop the lease for cached directories on rmdir or rename (bsc#1193629).\n- cifs: during reconnect, update interface if necessary (bsc#1193629).\n- cifs: enable caching of directories for which a lease is held (bsc#1193629).\n- cifs: find and use the dentry for cached non-root directories also (bsc#1193629).\n- cifs: fix double-fault crash during ntlmssp (bsc#1193629).\n- cifs: fix lock length calculation (bsc#1193629).\n- cifs: fix memory leaks in session setup (bsc#1193629).\n- cifs: fix missing unlock in cifs_file_copychunk_range() (git-fixes).\n- cifs: fix race condition with delayed threads (bsc#1193629).\n- cifs: fix reconnect on smb3 mount types (bsc#1201427).\n- cifs: fix skipping to incorrect offset in emit_cached_dirents (bsc#1193629).\n- cifs: fix small mempool leak in SMB2_negotiate() (bsc#1193629).\n- cifs: fix static checker warning (bsc#1193629).\n- cifs: fix uninitialised var in smb2_compound_op() (bsc#1193629).\n- cifs: fix use-after-free caused by invalid pointer `hostname` (bsc#1193629).\n- cifs: fix use-after-free on the link name (bsc#1193629).\n- cifs: fix wrong unlock before return from cifs_tree_connect() (bsc#1193629).\n- cifs: improve handlecaching (bsc#1193629).\n- cifs: improve symlink handling for smb2+ (bsc#1193629).\n- cifs: lease key is uninitialized in smb1 paths (bsc#1193629).\n- cifs: lease key is uninitialized in two additional functions when smb1 (bsc#1193629).\n- cifs: list_for_each() -\u003e list_for_each_entry() (bsc#1193629).\n- cifs: misc: fix spelling typo in comment (bsc#1193629).\n- cifs: move from strlcpy with unused retval to strscpy (bsc#1193629).\n- cifs: periodically query network interfaces from server (bsc#1193629).\n- cifs: populate empty hostnames for extra channels (bsc#1193629).\n- cifs: prevent copying past input buffer boundaries (bsc#1193629).\n- cifs: remove \u0027cifs_\u0027 prefix from init/destroy mids functions (bsc#1193629).\n- cifs: remove initialization value (bsc#1193629).\n- cifs: remove minor build warning (bsc#1193629).\n- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1193629).\n- cifs: remove remaining build warnings (bsc#1193629).\n- cifs: remove some camelCase and also some static build warnings (bsc#1193629).\n- cifs: remove unnecessary (void*) conversions (bsc#1193629).\n- cifs: remove unnecessary locking of chan_lock while freeing session (bsc#1193629).\n- cifs: remove unnecessary type castings (bsc#1193629).\n- cifs: remove unused server parameter from calc_smb_size() (bsc#1193629).\n- cifs: remove useless DeleteMidQEntry() (bsc#1193629).\n- cifs: remove useless parameter \u0027is_fsctl\u0027 from SMB2_ioctl() (bsc#1193629).\n- cifs: replace kfree() with kfree_sensitive() for sensitive data (bsc#1193629).\n- cifs: return correct error in -\u003ecalc_signature() (bsc#1193629).\n- cifs: return errors during session setup during reconnects (bsc#1193629).\n- cifs: revalidate mapping when doing direct writes (bsc#1193629).\n- cifs: secmech: use shash_desc directly, remove sdesc (bsc#1193629).\n- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir (bsc#1193629).\n- cifs: skip extra NULL byte in filenames (bsc#1193629).\n- cifs: store a pointer to a fid in the cfid structure instead of the struct (bsc#1193629).\n- cifs: truncate the inode and mapping when we simulate fcollapse (bsc#1193629).\n- cifs: update cifs_ses::ip_addr after failover (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: use ALIGN() and round_up() macros (bsc#1193629).\n- cifs: use LIST_HEAD() and list_move() to simplify code (bsc#1193629).\n- cifs: when a channel is not found for server, log its connection id (bsc#1193629).\n- cifs: when insecure legacy is disabled shrink amount of SMB1 code (bsc#1193629).\n- clk: ast2600: BCLK comes from EPLL (git-fixes).\n- clk: at91: fix the build with binutils 2.27 (git-fixes).\n- clk: baikal-t1: Add SATA internal ref clock buffer (git-fixes).\n- clk: baikal-t1: Add shared xGMAC ref/ptp clocks internal parent (git-fixes).\n- clk: baikal-t1: Fix invalid xGMAC PTP clock divider (git-fixes).\n- clk: bcm2835: Make peripheral PLLC critical (git-fixes).\n- clk: bcm2835: Round UART input clock up (bsc#1188238)\n- clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes).\n- clk: bcm: rpi: Add support for VEC clock (bsc#1196632)\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: bcm: rpi: Prevent out-of-bounds access (git-fixes).\n- clk: bcm: rpi: Use correct order for the parameters of devm_kcalloc() (git-fixes).\n- clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).\n- clk: imx: scu: fix memleak on platform_device_add() fails (git-fixes).\n- clk: ingenic-tcu: Properly enable registers before accessing timers (git-fixes).\n- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).\n- clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent (git-fixes).\n- clk: mediatek: reset: Fix written reset bit offset (git-fixes).\n- clk: meson: Hold reference returned by of_get_parent() (git-fixes).\n- clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).\n- clk: qcom: apss-ipq6018: mark apcs_alias0_core_clk as critical (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver\u0027s init level (git-fixes).\n- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).\n- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).\n- clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).\n- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).\n- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).\n- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: sprd: Hold reference returned by of_get_parent() (git-fixes).\n- clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).\n- clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).\n- clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).\n- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).\n- clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes).\n- clk: vc5: Fix 5P49V6901 outputs disabling when enabling FOD (git-fixes).\n- clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).\n- clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate (git-fixes).\n- clocksource/drivers/hyperv: add data structure for reference TSC MSR (git-fixes).\n- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).\n- constraints: increase disk space for all architectures References: bsc#1203693 aarch64 is already suffering. SLE15-SP5 x86_64 stats show that it is very close to the limit.\n- cpufreq: intel_pstate: Handle no_turbo in frequency invariance (jsc#PED-849).\n- cpufreq: intel_pstate: Support Sapphire Rapids OOB mode (jsc#PED-849).\n- cpufreq: qcom: fix memory leak in error path (git-fixes).\n- cpufreq: qcom: fix writes in read-only memory region (git-fixes).\n- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).\n- cpuidle: intel_idle: Drop redundant backslash at line end (jsc#PED-1936).\n- crypto: akcipher - default implementation for setting a private key (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).\n- crypto: cavium - prevent integer overflow loading firmware (git-fixes).\n- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).\n- crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes).\n- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).\n- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).\n- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/sec - fix auth key size error (git-fixes).\n- crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).\n- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).\n- crypto: inside-secure - Change swab to swab32 (git-fixes).\n- crypto: inside-secure - Replace generic aes with libaes (git-fixes).\n- crypto: marvell/octeontx - prevent integer overflows (git-fixes).\n- crypto: qat - fix default value of WDT timer (git-fixes).\n- crypto: sahara - do not sleep when in softirq (git-fixes).\n- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).\n- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).\n- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).\n- cs-dsp and serial-multi-instantiate enablement (bsc#1203699)\n- device property: Check fwnode-\u003esecondary when finding properties (git-fixes).\n- device property: Fix documentation for *_match_string() APIs (git-fixes).\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm btree remove: fix use after free in rebalance_children() (git-fixes).\n- dm crypt: make printing of the key constant-time (git-fixes).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm integrity: fix memory corruption when tag_size is less than digest size (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm stats: add cond_resched when looping over entries (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm: fix double accounting of flush with data (git-fixes).\n- dm: interlock pending dm_io and dm_wait_for_bios_completion (git-fixes).\n- dm: properly fix redundant bio-based IO accounting (git-fixes).\n- dm: remove unnecessary assignment statement in alloc_dev() (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- dm: revert partial fix for redundant bio-based IO accounting (git-fixes).\n- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).\n- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).\n- dma-debug: make things less spammy under memory pressure (git-fixes).\n- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).\n- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).\n- dmaengine: at_hdmac: Do not call the complete callback on device_terminate_all (git-fixes).\n- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).\n- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).\n- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over descriptor (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over the active list (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency problems by removing atc_complete_all() (git-fixes).\n- dmaengine: at_hdmac: Fix descriptor handling when issuing it to hardware (git-fixes).\n- dmaengine: at_hdmac: Fix impossible condition (git-fixes).\n- dmaengine: at_hdmac: Fix premature completion of desc in issue_pending (git-fixes).\n- dmaengine: at_hdmac: Free the memset buf without holding the chan lock (git-fixes).\n- dmaengine: at_hdmac: Protect atchan-\u003estatus with the channel lock (git-fixes).\n- dmaengine: at_hdmac: Start transfer for cyclic channels in issue_pending (git-fixes).\n- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).\n- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).\n- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).\n- dmaengine: hisilicon: Add multi-thread support for a DMA channel (git-fixes).\n- dmaengine: hisilicon: Disable channels when unregister hisi_dma (git-fixes).\n- dmaengine: hisilicon: Fix CQ head update (git-fixes).\n- dmaengine: idxd: add helper for per interrupt handle drain (jsc#PED-682).\n- dmaengine: idxd: add knob for enqcmds retries (jsc#PED-755).\n- dmaengine: idxd: change MSIX allocation based on per wq activation (jsc#PED-664).\n- dmaengine: idxd: change bandwidth token to read buffers (jsc#PED-679).\n- dmaengine: idxd: create locked version of idxd_quiesce() call (jsc#PED-682).\n- dmaengine: idxd: deprecate token sysfs attributes for read buffers (jsc#PED-679).\n- dmaengine: idxd: embed irq_entry in idxd_wq struct (jsc#PED-664).\n- dmaengine: idxd: fix descriptor flushing locking (jsc#PED-664).\n- dmaengine: idxd: fix retry value to be constant for duration of function call (git-fixes).\n- dmaengine: idxd: force wq context cleanup on device disable path (git-fixes).\n- dmaengine: idxd: handle interrupt handle revoked event (jsc#PED-682).\n- dmaengine: idxd: handle invalid interrupt handle descriptors (jsc#PED-682).\n- dmaengine: idxd: int handle management refactoring (jsc#PED-682).\n- dmaengine: idxd: match type for retries var in idxd_enqcmds() (git-fixes).\n- dmaengine: idxd: move interrupt handle assignment (jsc#PED-682).\n- dmaengine: idxd: rework descriptor free path on failure (jsc#PED-682).\n- dmaengine: idxd: set defaults for wq configs (jsc#PED-688).\n- dmaengine: idxd: update IAA definitions for user header (jsc#PED-763).\n- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).\n- dmaengine: ioat: stop mod_timer from resurrecting deleted timer in __cleanup() (git-fixes).\n- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).\n- dmaengine: mxs: use platform_driver_register (git-fixes).\n- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).\n- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).\n- dmaengine: ti: k3-udma-glue: fix memory leak when register device fail (git-fixes).\n- dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() (git-fixes).\n- dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow (git-fixes).\n- dmaengine: xilinx_dma: Fix devm_platform_ioremap_resource error handling (git-fixes).\n- dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent API failure (git-fixes).\n- dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property (git-fixes).\n- docs, kprobes: Fix the wrong location of Kprobes (git-fixes).\n- docs/core-api: expand Fedora instructions for GCC plugins (git-fixes).\n- docs/kernel-parameters: Update descriptions for \u0027mitigations=\u0027 param with retbleed (git-fixes).\n- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).\n- docs: i2c: i2c-topology: fix incorrect heading (git-fixes).\n- docs: zh_CN: fix a broken reference (git-fixes).\n- dpaa2-eth: fix ethtool statistics (git-fixes).\n- dpaa2-eth: trace the allocated address instead of page struct (git-fixes).\n- dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drivers/iio: Remove all strcpy() uses (git-fixes).\n- drivers: serial: jsm: fix some leaks in probe (git-fixes).\n- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).\n- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).\n- drm/amd/amdgpu: fixing read wrong pf2vf data in SRIOV (git-fixes).\n- drm/amd/amdgpu: skip ucode loading if ucode_size == 0 (git-fixes).\n- drm/amd/display: Add HUBP surface flip interrupt handler (git-fixes).\n- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).\n- drm/amd/display: Assume an LTTPR is always present on fixed_vs links (git-fixes).\n- drm/amd/display: Avoid MPC infinite loop (git-fixes).\n- drm/amd/display: Changed pipe split policy to allow for multi-display (bsc#1152472) Backporting notes: \t* remove changes to non-existing 201 and 31 directories\n- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).\n- drm/amd/display: Correct MPC split policy for DCN301 (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).\n- drm/amd/display: Fix build breakage with CONFIG_DEBUG_FS=n (git-fixes).\n- drm/amd/display: Fix double cursor on non-video RGB MPO (git-fixes).\n- drm/amd/display: Fix pixel clock programming (git-fixes).\n- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).\n- drm/amd/display: Fix vblank refcount in vrr transition (git-fixes).\n- drm/amd/display: For stereo keep \u0027FLIP_ANY_FRAME\u0027 (git-fixes).\n- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).\n- drm/amd/display: Limit user regamma to a valid value (git-fixes).\n- drm/amd/display: Mark dml30\u0027s UseMinimumDCFCLK() as noinline for stack usage (git-fixes).\n- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateFlipSchedule() (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateWatermarksAndDRAMSpeedChangeSupport() (git-fixes).\n- drm/amd/display: Remove interface for periodic interrupt 1 (git-fixes).\n- drm/amd/display: Reset DMCUB before HW init (git-fixes).\n- drm/amd/display: Revert \u0027drm/amd/display: turn DPMS off on connector unplug\u0027 (git-fixes).\n- drm/amd/display: avoid doing vm_init multiple time (git-fixes).\n- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).\n- drm/amd/display: skip audio setup when audio stream is enabled (git-fixes).\n- drm/amd/display: update gamut remap if plane has changed (git-fixes).\n- drm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid (git-fixes).\n- drm/amd/pm: disable BACO entry/exit completely on several sienna cichlid cards (git-fixes).\n- drm/amd/pm: smu7_hwmgr: fix potential off-by-one overflow in \u0027performance_levels\u0027 (git-fixes).\n- drm/amdgpu/display: change pipe policy for DCN 2.0 (git-fixes).\n- drm/amdgpu/display: change pipe policy for DCN 2.1 (git-fixes).\n- drm/amdgpu/gfx10: add wraparound gpu counter check for APUs as well (bsc#1152472) Backporting notes: \t* also fix default branch\n- drm/amdgpu/gfx9: switch to golden tsc registers for renoir+ (bsc#1152472) Backporting notes: \t* replace IP_VERSION() with CHIP_ constants\n- drm/amdgpu: Check BO\u0027s requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).\n- drm/amdgpu: Move psp_xgmi_terminate call from amdgpu_xgmi_remove_device to psp_hw_fini (git-fixes).\n- drm/amdgpu: Remove one duplicated ef removal (git-fixes).\n- drm/amdgpu: Separate vf2pf work item init from virt data exchange (git-fixes).\n- drm/amdgpu: add missing pci_disable_device() in amdgpu_pmops_runtime_resume() (git-fixes).\n- drm/amdgpu: disable BACO on special BEIGE_GOBY card (git-fixes).\n- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).\n- drm/amdgpu: fix initial connector audio value (git-fixes).\n- drm/amdgpu: fix sdma doorbell init ordering on APUs (git-fixes).\n- drm/amdgpu: make sure to init common IP before gmc (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: move nbio ih_doorbell_range() into ih code for vega (git-fixes).\n- drm/amdgpu: move nbio sdma_doorbell_range() into sdma code for vega (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/amdgpu: set vm_update_mode=0 as default for Sienna Cichlid in SRIOV case (git-fixes).\n- drm/amdgpu: use dirty framebuffer helper (git-fixes).\n- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() (git-fixes).\n- drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr() (git-fixes).\n- drm/amdkfd: Migrate in CPU page fault use current mm (git-fixes).\n- drm/amdkfd: avoid recursive lock in migrations back to RAM (git-fixes).\n- drm/amdkfd: handle CPU fault on COW mapping (git-fixes).\n- drm/bridge: Avoid uninitialized variable warning (git-fixes).\n- drm/bridge: display-connector: implement bus fmts callbacks (git-fixes).\n- drm/bridge: lt8912b: add vsync hsync (git-fixes).\n- drm/bridge: lt8912b: fix corrupted image output (git-fixes).\n- drm/bridge: lt8912b: set hdmi or dvi mode (git-fixes).\n- drm/bridge: lt9611uxc: Cancel only driver\u0027s work (git-fixes).\n- drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).\n- drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).\n- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/gma500: Fix BUG: sleeping function called from invalid context errors (git-fixes).\n- drm/hyperv: Add ratelimit on error message (git-fixes).\n- drm/hyperv: Do not overwrite dirt_needed value set by host (git-fixes).\n- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).\n- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).\n- drm/i915/dp: Reset frl trained flag before restarting FRL training (git-fixes).\n- drm/i915/ehl: Update MOCS table for EHL (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/gt: Restrict forced preemption to the active context (git-fixes).\n- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).\n- drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).\n- drm/i915/hdmi: convert intel_hdmi_to_dev to intel_hdmi_to_i915 (bsc#1152489) Backporting notes: \t* update additional patch on top\n- drm/i915/reg: Fix spelling mistake \u0027Unsupport\u0027 -\u003e \u0027Unsupported\u0027 (git-fixes).\n- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).\n- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).\n- drm/i915: Implement WaEdpLinkRateDataReload (git-fixes).\n- drm/i915: Reject unsupported TMDS rates on ICL+ (git-fixes).\n- drm/i915: Skip wm/ddb readout for disabled pipes (git-fixes).\n- drm/i915: fix null pointer dereference (git-fixes).\n- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).\n- drm/komeda: Fix handling of atomic commits in the atomic_commit_tail hook (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: Allow commands to be sent during video mode (git-fixes).\n- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).\n- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).\n- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/mediatek: dsi: Add atomic {destroy,duplicate}_state, reset callbacks (git-fixes).\n- drm/mediatek: dsi: Move mtk_dsi_stop() call back to mtk_dsi_poweroff() (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/meson: explicitly remove aggregate driver at module unload time (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/mipi-dsi: Detach devices when removing the host (git-fixes).\n- drm/msm/dp: Silence inconsistent indent warning (git-fixes).\n- drm/msm/dp: correct 1.62G link rate at dp_catalog_ctrl_config_msa() (git-fixes).\n- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).\n- drm/msm/dp: fix IRQ lifetime (git-fixes).\n- drm/msm/dpu: Fix comment typo (git-fixes).\n- drm/msm/dpu: Fix for non-visible planes (git-fixes).\n- drm/msm/dpu: index dpu_kms-\u003ehw_vbif using vbif_idx (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/hdmi: drop empty \u0027none\u0027 regulator lists (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/hdmi: fix IRQ lifetime (git-fixes).\n- drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).\n- drm/msm: Fix dirtyfb refcounting (git-fixes).\n- drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).\n- drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).\n- drm/msm: fix use-after-free on probe deferral (git-fixes).\n- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).\n- drm/nouveau/kms/nv140-: Disable interlacing (git-fixes).\n- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).\n- drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc() (git-fixes).\n- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).\n- drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/nouveau: recognise GA103 (git-fixes).\n- drm/nouveau: wait for the exclusive fence after the shared ones v2 (bsc#1152472) Backporting notes: \t* context changes\n- drm/omap: dss: Fix refcount leak bugs (git-fixes).\n- drm/panel: simple: Fix innolux_g121i1_l01 bus_format (git-fixes).\n- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).\n- drm/panfrost: devfreq: set opp to the recommended one to configure regulator (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).\n- drm/rockchip: dsi: Force synchronous probe (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/scheduler: quieten kernel-doc warnings (git-fixes).\n- drm/shmem-helper: Add missing vunmap on error (git-fixes).\n- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/tegra: vic: Fix build warning when CONFIG_PM=n (git-fixes).\n- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).\n- drm/udl: Add parameter to set number of URBs (bsc#1195917).\n- drm/udl: Add reset_resume (bsc#1195917)\n- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).\n- drm/udl: Drop unneeded alignment (bsc#1195917).\n- drm/udl: Enable damage clipping (bsc#1195917).\n- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).\n- drm/udl: Fix potential URB leaks (bsc#1195917).\n- drm/udl: Increase the default URB list size to 20 (bsc#1195917).\n- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).\n- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).\n- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).\n- drm/udl: Restore display mode on resume (bsc#1195917)\n- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).\n- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).\n- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).\n- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).\n- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).\n- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).\n- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).\n- drm/vc4: kms: Fix IS_ERR() vs NULL check for vc4_kms (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- drm/virtio: Check whether transferred 2D BO is shmem (git-fixes).\n- drm/virtio: Unlock reservations on virtio_gpu_object_shmem_init() error (git-fixes).\n- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).\n- drm: Prevent drm_copy_field() to attempt copying a NULL pointer (git-fixes).\n- drm: Use size_t type for len variable in drm_copy_field() (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: adv7511: fix CEC power down control register offset (git-fixes).\n- drm: bridge: dw_hdmi: only trigger hotplug event on link change (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- drm: fix drm_mipi_dbi build errors (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).\n- drm:pl111: Add of_node_put() when breaking out of for_each_available_child_of_node() (git-fixes).\n- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).\n- dt-bindings: PCI: microchip,pcie-host: fix missing clocks properties (git-fixes).\n- dt-bindings: PCI: microchip,pcie-host: fix missing dma-ranges (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).\n- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).\n- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).\n- dt-bindings: clocks: imx8mp: Add ID for usb suspend clock (git-fixes).\n- dt-bindings: crypto: ti,sa2ul: drop dma-coherent property (git-fixes).\n- dt-bindings: display/msm: dpu-sc7180: add missing DPU opp-table (git-fixes).\n- dt-bindings: display/msm: dpu-sdm845: add missing DPU opp-table (git-fixes).\n- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).\n- dt-bindings: hwmon: (mr75203) fix \u0027intel,vm-map\u0027 property to be optional (git-fixes).\n- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).\n- dt-bindings: mtd: intel: lgm-nand: Fix compatible string (git-fixes).\n- dt-bindings: mtd: intel: lgm-nand: Fix maximum chip select value (git-fixes).\n- dt-bindings: phy: qcom,qmp-usb3-dp: fix bogus clock-cells property (git-fixes).\n- dt-bindings: phy: qcom,qmp: fix bogus clock-cells property (git-fixes).\n- dt-bindings: power: gpcv2: add power-domains property (git-fixes).\n- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- dyndbg: fix module.dyndbg handling (git-fixes).\n- dyndbg: fix static_branch manipulation (git-fixes).\n- dyndbg: let query-modname override actual module name (git-fixes).\n- e1000e: Fix TX dispatch condition (git-fixes).\n- e100: Fix possible use after free in e100_xmit_prepare (git-fixes).\n- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).\n- efi/tpm: Pass correct address to memblock_reserve (git-fixes).\n- efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- efi: libstub: Disable struct randomization (git-fixes).\n- efi: libstub: drop pointless get_memory_map() call (git-fixes).\n- efi: random: Use \u0027ACPI reclaim\u0027 memory for random seed (git-fixes).\n- efi: random: reduce seed size to 32 bytes (git-fixes).\n- erofs: fix deadlock when shrink erofs slab (git-fixes).\n- eth: alx: take rtnl_lock on resume (git-fixes).\n- eth: sun: cassini: remove dead code (git-fixes).\n- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).\n- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).\n- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).\n- exfat: Drop superfluous new line for error messages (bsc#1201725).\n- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).\n- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix referencing wrong parent directory information after renaming (git-fixes).\n- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).\n- exfat: use updated exfat_chain directly during renaming (git-fixes).\n- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: avoid BUG_ON when creating xattrs (bsc#1205496).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).\n- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).\n- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769). Refresh ext4-fix-race-condition-between-ext4_write-and-ext4_.patch\n- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).\n- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).\n- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).\n- ext4: fix null-ptr-deref in \u0027__ext4_journal_ensure_credits\u0027 (bsc#1202764).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix super block checksum incorrect after mount (bsc#1202773).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).\n- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).\n- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).\n- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).\n- fat: add ratelimit to fat*_ent_bread() (git-fixes).\n- fbcon: Add option to enable legacy hardware acceleration (bsc#1152472) Backporting changes: \t* context fixes in other patch \t* update config\n- fbcon: Fix accelerated fbdev scrolling while logo is still shown (bsc#1152472)\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).\n- fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).\n- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).\n- fec: Fix timer capture timing in `fec_ptp_enable_pps()` (git-fixes).\n- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).\n- firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).\n- firmware: arm_scmi: Fix the asynchronous reset requests (git-fixes).\n- firmware: arm_scmi: Harden accesses to the reset domains (git-fixes).\n- firmware: arm_scmi: Harden accesses to the sensor domains (git-fixes).\n- firmware: arm_scmi: Improve checks in the info_get operations (git-fixes).\n- firmware: arm_scmi: Make Rx chan_setup fail on memory errors (git-fixes).\n- firmware: arm_scmi: Suppress the driver\u0027s bind attributes (git-fixes).\n- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).\n- firmware: coreboot: Register bus in module init (git-fixes).\n- firmware: cs_dsp: Add lockdep asserts to interface functions (bsc#1203699).\n- firmware: cs_dsp: Add memory chunk helpers (bsc#1203699).\n- firmware: cs_dsp: Add offset to cs_dsp read/write (bsc#1203699).\n- firmware: cs_dsp: Add pre_run callback (bsc#1203699).\n- firmware: cs_dsp: Add pre_stop callback (bsc#1203699).\n- firmware: cs_dsp: Add support for rev 2 coefficient files (bsc#1203699).\n- firmware: cs_dsp: Add version checks on coefficient loading (bsc#1203699).\n- firmware: cs_dsp: Allow creation of event controls (bsc#1203699).\n- firmware: cs_dsp: Clarify some kernel doc comments (bsc#1203699).\n- firmware: cs_dsp: Clear core reset for cache (bsc#1203699).\n- firmware: cs_dsp: Fix overrun of unterminated control name string (bsc#1203699).\n- firmware: cs_dsp: Move lockdep asserts to avoid potential null pointer (bsc#1203699).\n- firmware: cs_dsp: Perform NULL check in cs_dsp_coeff_write/read_ctrl (bsc#1203699).\n- firmware: cs_dsp: Print messages from bin files (bsc#1203699).\n- firmware: cs_dsp: add driver to support firmware loading on Cirrus Logic DSPs (bsc#1203699).\n- firmware: cs_dsp: tidy includes in cs_dsp.c and cs_dsp.h (bsc#1203699).\n- firmware: google: Test spinlock on panic path to avoid lockups (git-fixes).\n- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fix race between exit_itimers() and /proc/pid/timers (git-fixes).\n- fm10k: Fix error handling in fm10k_init_module() (git-fixes).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- fs/binfmt_elf: Fix memory leak in load_elf_binary() (git-fixes).\n- ftrace/x86: Add back ftrace_expected assignment (git-fixes).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- ftrace: Fix char print issue in print_ip_ins() (git-fixes).\n- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).\n- fuse: Remove the control interface for virtio-fs (bsc#1203798).\n- fuse: add file_modified() to fallocate (bsc#1205332).\n- fuse: fix deadlock between atomic O_TRUNC and page invalidation (bsc#1204533).\n- fuse: fix readdir cache race (bsc#1205331).\n- fuse: ioctl: translate ENOSYS (bsc#1203139).\n- fuse: limit nsec (bsc#1203138).\n- fuse: lock inode unconditionally in fuse_fallocate() (bsc#1206273).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- gcov: support GCC 12.1 and newer compilers (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: amd8111: Fix PCI device reference count leak (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: mockup: fix NULL pointer dereference when removing debugfs (git-fixes).\n- gpio: mockup: remove gpio debugfs when remove device (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: mvebu: Fix check for pwm support on non-A8K platforms (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully (git-fixes).\n- gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- habanalabs/gaudi: fix shift out of bounds (git-fixes).\n- habanalabs/gaudi: mask constant value before cast (git-fixes).\n- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).\n- hid: hid-logitech-hidpp: avoid unnecessary assignments in hidpp_connect_event (git-fixes).\n- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- hinic: Avoid some over memory allocation (git-fixes).\n- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).\n- hv_sock: Add validation for untrusted Hyper-V values (git-fixes).\n- hv_sock: Check hv_pkt_iter_first_raw()\u0027s return value (git-fixes).\n- hv_sock: Copy packets sent by Hyper-V out of the ring buffer (git-fixes).\n- hwmon/coretemp: Handle large core ID value (git-fixes).\n- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).\n- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).\n- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).\n- hwmon: (drivetemp) Add module alias (git-fixes).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- hwmon: (gsc-hwmon) Call of_node_get() before of_find_xxx API (git-fixes).\n- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).\n- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).\n- hwmon: (ina3221) Fix shunt sum critical calculation (git-fixes).\n- hwmon: (ltc2947) fix temperature scaling (git-fixes).\n- hwmon: (mr75203) enable polling for all VM channels (git-fixes).\n- hwmon: (mr75203) fix VM sensor allocation when \u0027intel,vm-map\u0027 not defined (git-fixes).\n- hwmon: (mr75203) fix multi-channel voltage reading (git-fixes).\n- hwmon: (mr75203) fix voltage equation for negative source input (git-fixes).\n- hwmon: (mr75203) update pvt-\u003ev_num and vm_num to the actual number of used sensors (git-fixes).\n- hwmon: (pmbus/mp2888) Fix sensors readouts for MPS Multi-phase mp2888 controller (git-fixes).\n- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).\n- hwmon: (sht4x) do not overflow clamping operation on 32-bit platforms (git-fixes).\n- hwmon: (tps23861) fix byte order in resistance register (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: acpi: Add an i2c_acpi_client_count() helper function (bsc#1203699).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: designware: Fix handling of real but unexpected device interrupts (git-fixes).\n- i2c: i801: Add support for Intel Ice Lake PCH-N (jsc#PED-634).\n- i2c: i801: Add support for Intel Meteor Lake-P (jsc#PED-732).\n- i2c: i801: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).\n- i2c: i801: Improve handling of chip-specific feature definitions (jsc#PED-634).\n- i2c: i801: add lis3lv02d\u0027s I2C address for Vostro 5568 (git-fixes).\n- i2c: imx: If pm_runtime_get_sync() returned 1 device access is possible (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: imx: Only DMA messages with I2C_M_DMA_SAFE flag set (git-fixes).\n- i2c: mlxbf: Fix frequency calculation (git-fixes).\n- i2c: mlxbf: incorrect base address passed during io write (git-fixes).\n- i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() (git-fixes).\n- i2c: mlxbf: support lock mechanism (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- i2c: mxs: Silence a clang warning (git-fixes).\n- i2c: npcm7xx: Fix error handling in npcm_i2c_init() (git-fixes).\n- i2c: npcm: Capitalize the one-line comment (git-fixes).\n- i2c: npcm: Correct slave role behavior (git-fixes).\n- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).\n- i2c: piix4: Fix adapter not be removed in piix4_remove() (git-fixes).\n- i2c: qcom-cci: Fix ordering of pm_runtime_xx and i2c_add_adapter (git-fixes).\n- i2c: tegra: Allocate DMA memory for DMA engine (git-fixes).\n- i2c: xiic: Add platform module alias (git-fixes).\n- i40e: Fix call trace in setup_tx_descriptors (git-fixes).\n- i40e: Fix dropped jumbo frames statistics (git-fixes).\n- i40e: Fix to stop tx_timeout recovery if GLOBR fails (git-fixes).\n- iavf: Fix adminq error handling (git-fixes).\n- iavf: Fix handling of dummy receive descriptors (git-fixes).\n- iavf: Fix reset error handling (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- ice: Allow operation with reduced device MSI-X (bsc#1201987).\n- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (git-fixes).\n- ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler (git-fixes).\n- ice: Fix race during aux device (un)plugging (git-fixes).\n- ice: Fix switchdev rules book keeping (git-fixes).\n- ice: Match on all profiles in slow-path (git-fixes).\n- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (git-fixes).\n- ice: check (DD | EOF) bits on Rx descriptor rather than (EOP | RS) (git-fixes).\n- ice: do not setup vlan for loopback VSI (git-fixes).\n- ice: fix \u0027scheduling while atomic\u0027 on aux critical err interrupt (git-fixes).\n- ice: fix crash when writing timestamp on RX rings (git-fixes).\n- ice: fix possible under reporting of ethtool Tx and Rx statistics (git-fixes).\n- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).\n- ieee80211: change HE nominal packet padding value defines (bsc#1202131).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- ieee802154: cc2520: Fix error return code in cc2520_hw_init() (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- igb: Make DMA faster when CPU is active on the PCIe link (git-fixes).\n- igb: fix a use-after-free issue in igb_clean_tx_ring (git-fixes).\n- igb: skip phy status check where unavailable (git-fixes).\n- iio: ABI: Fix wrong format of differential capacitance channel ABI (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).\n- iio: accel: bma400: Reordering of header files (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).\n- iio: ad7292: Prevent regulator double disable (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: fix channel readings for some variants (git-fixes).\n- iio: adc: at91-sama5d2_adc: check return status for pressure and touch (git-fixes).\n- iio: adc: at91-sama5d2_adc: disable/prepare buffer on suspend/resume (git-fixes).\n- iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).\n- iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq (git-fixes).\n- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: mcp3911: use correct id bits (git-fixes).\n- iio: adc: mp2629: fix potential array out of bound access (git-fixes).\n- iio: adc: mp2629: fix wrong comparison of channel (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: adxl372: Fix unsafe buffer attributes (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: bmc150-accel-core: Fix unsafe buffer attributes (git-fixes).\n- iio: common: ssp: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).\n- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).\n- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).\n- iio: inkern: fix return value in devm_of_iio_channel_get_by_name() (git-fixes).\n- iio: inkern: only release the device node when done with it (git-fixes).\n- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).\n- iio: light: tsl2583: Fix module unloading (git-fixes).\n- iio: ltc2497: Fix reading conversion results (git-fixes).\n- iio: magnetometer: yas530: Change data type of hard_offsets to signed (git-fixes).\n- iio: ms5611: Simplify IO callback parameters (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: pressure: dps310: Refactor startup procedure (git-fixes).\n- iio: pressure: dps310: Reset chip after timeout (git-fixes).\n- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).\n- iio: pressure: ms5611: fixed value compensation bug (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).\n- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).\n- iio: temperature: ltc2983: allocate iio channels once (git-fixes).\n- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).\n- ima: fix blocking of security.ima xattrs of unsupported algorithms (git-fixes).\n- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).\n- init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash (git-fixes).\n- intel_idle: Add AlderLake support (jsc#PED-824).\n- intel_idle: Fix SPR C6 optimization (jsc#PED-824 jsc#PED-1936).\n- intel_idle: Fix the \u0027preferred_cstates\u0027 module parameter (jsc#PED-824 jsc#PED-1936).\n- intel_idle: make SPR C1 and C1E be independent (jsc#PED-1936).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- interconnect: imx: fix max_node_id (git-fixes).\n- io-wq: Remove duplicate code in io_workqueue_create() (bnc#1205113).\n- io-wq: do not retry task_work creation failure on fatal conditions (bnc#1205113).\n- io-wq: ensure we exit if thread group is exiting (git-fixes).\n- io-wq: exclusively gate signal based exit on get_signal() return (git-fixes).\n- io-wq: fix cancellation on create-worker failure (bnc#1205113).\n- io-wq: fix silly logic error in io_task_work_match() (bnc#1205113).\n- io_uring: add a schedule point in io_add_buffers() (git-fixes).\n- io_uring: correct __must_hold annotation (git-fixes).\n- io_uring: drop ctx-\u003euring_lock before acquiring sqd-\u003elock (git-fixes).\n- io_uring: ensure IORING_REGISTER_IOWQ_MAX_WORKERS works with SQPOLL (git-fixes).\n- io_uring: fix io_timeout_remove locking (git-fixes).\n- io_uring: fix missing mb() before waitqueue_active (git-fixes).\n- io_uring: fix missing sigmask restore in io_cqring_wait() (git-fixes).\n- io_uring: fix possible poll event lost in multi shot mode (git-fixes).\n- io_uring: pin SQPOLL data before unlocking ring lock (git-fixes).\n- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).\n- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).\n- iommu/amd: Enable swiotlb in all cases (git-fixes).\n- iommu/amd: Fix I/O page table memory leak (git-fixes).\n- iommu/amd: Recover from event log overflow (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).\n- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/dart: Add missing module owner to ops structure (git-fixes).\n- iommu/dart: check return value after calling platform_get_resource() (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).\n- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).\n- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).\n- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).\n- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Do not falsely log intel_iommu is unsupported kernel option (bsc#1204947).\n- iommu/vt-d: Drop stop marker messages (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).\n- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).\n- iommu/vt-d: Remove global g_iommus array (bsc#1200301).\n- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).\n- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).\n- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu: Fix potential use-after-free during probe (git-fixes).\n- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).\n- iov_iter: fix build issue due to possible type mis-match (git-fixes).\n- ip: Fix data-races around sysctl_ip_fwd_update_priority (git-fixes).\n- ipmi: fix initialization when workqueue allocation fails (git-fixes).\n- ipv4: Fix data-races around sysctl_fib_multipath_hash_policy (git-fixes).\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap (git-fixes).\n- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).\n- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).\n- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).\n- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).\n- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).\n- iwlwifi: Add support for more BZ HWs (bsc#1202131).\n- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).\n- iwlwifi: BZ Family SW reset support (bsc#1202131).\n- iwlwifi: Configure FW debug preset via module param (bsc#1202131).\n- iwlwifi: Fix FW name for gl (bsc#1202131).\n- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).\n- iwlwifi: Fix syntax errors in comments (bsc#1202131).\n- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).\n- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).\n- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).\n- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).\n- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).\n- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).\n- iwlwifi: add new Qu-Hr device (bsc#1202131).\n- iwlwifi: add new ax1650 killer device (bsc#1202131).\n- iwlwifi: add new device id 7F70 (bsc#1202131).\n- iwlwifi: add new pci SoF with JF (bsc#1202131).\n- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).\n- iwlwifi: add support for BNJ HW (bsc#1202131).\n- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).\n- iwlwifi: add support for Bz-Z HW (bsc#1202131).\n- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).\n- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).\n- iwlwifi: allow rate-limited error messages (bsc#1202131).\n- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).\n- iwlwifi: api: remove ttl field from TX command (bsc#1202131).\n- iwlwifi: api: remove unused RX status bits (bsc#1202131).\n- iwlwifi: avoid variable shadowing (bsc#1202131).\n- iwlwifi: avoid void pointer arithmetic (bsc#1202131).\n- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).\n- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).\n- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).\n- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).\n- iwlwifi: dbg: check trigger data before access (bsc#1202131).\n- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).\n- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).\n- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).\n- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).\n- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).\n- iwlwifi: de-const properly where needed (bsc#1202131).\n- iwlwifi: debugfs: remove useless double condition (bsc#1202131).\n- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).\n- iwlwifi: do not use __unused as variable name (bsc#1202131).\n- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).\n- iwlwifi: dump CSR scratch from outer function (bsc#1202131).\n- iwlwifi: dump RCM error tables (bsc#1202131).\n- iwlwifi: dump both TCM error tables if present (bsc#1202131).\n- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).\n- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: eeprom: clean up macros (bsc#1202131).\n- iwlwifi: fix LED dependencies (bsc#1202131).\n- iwlwifi: fix debug TLV parsing (bsc#1202131).\n- iwlwifi: fix fw/img.c license statement (bsc#1202131).\n- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).\n- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).\n- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).\n- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).\n- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).\n- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).\n- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).\n- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).\n- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).\n- iwlwifi: fw: make dump_start callback void (bsc#1202131).\n- iwlwifi: fw: remove dead error log code (bsc#1202131).\n- iwlwifi: implement reset flow for Bz devices (bsc#1202131).\n- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).\n- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).\n- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).\n- iwlwifi: make some functions friendly to sparse (bsc#1202131).\n- iwlwifi: move symbols into a separate namespace (bsc#1202131).\n- iwlwifi: mvm/api: define system control command (bsc#1202131).\n- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).\n- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).\n- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).\n- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).\n- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).\n- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).\n- iwlwifi: mvm: Do not fail if PPAG isn\u0027t supported (bsc#1202131).\n- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).\n- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).\n- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).\n- iwlwifi: mvm: Remove antenna c references (bsc#1202131).\n- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).\n- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).\n- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).\n- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).\n- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).\n- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).\n- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).\n- iwlwifi: mvm: add US/CA to TAS block list if OEM isn\u0027t allowed (bsc#1202131).\n- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).\n- iwlwifi: mvm: add definitions for new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).\n- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).\n- iwlwifi: mvm: add some missing command strings (bsc#1202131).\n- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).\n- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).\n- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).\n- iwlwifi: mvm: add support for OCE scan (bsc#1202131).\n- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).\n- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).\n- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).\n- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).\n- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).\n- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).\n- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).\n- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).\n- iwlwifi: mvm: convert old rate \u0026 flags to the new format (bsc#1202131).\n- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).\n- iwlwifi: mvm: correctly set channel flags (bsc#1202131).\n- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).\n- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).\n- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).\n- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).\n- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).\n- iwlwifi: mvm: do not get address of mvm-\u003efwrt just to dereference as a pointer (bsc#1202131).\n- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).\n- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).\n- iwlwifi: mvm: drop too short packets silently (bsc#1202131).\n- iwlwifi: mvm: extend session protection on association (bsc#1202131).\n- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).\n- iwlwifi: mvm: fix a stray tab (bsc#1202131).\n- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).\n- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).\n- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).\n- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).\n- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).\n- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).\n- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).\n- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).\n- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).\n- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).\n- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).\n- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).\n- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).\n- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).\n- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).\n- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).\n- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).\n- iwlwifi: mvm: remove card state notification code (bsc#1202131).\n- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).\n- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).\n- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).\n- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).\n- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).\n- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).\n- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).\n- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).\n- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).\n- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).\n- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).\n- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).\n- iwlwifi: mvm: support RLC configuration command (bsc#1202131).\n- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).\n- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).\n- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).\n- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).\n- iwlwifi: mvm: update RFI TLV (bsc#1202131).\n- iwlwifi: mvm: update definitions due to new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).\n- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).\n- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).\n- iwlwifi: nvm: Correct HE capability (bsc#1202131).\n- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).\n- iwlwifi: parse error tables from debug TLVs (bsc#1202131).\n- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).\n- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).\n- iwlwifi: pcie: add support for MS devices (bsc#1202131).\n- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).\n- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).\n- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).\n- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).\n- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).\n- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).\n- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).\n- iwlwifi: pcie: remove duplicate entry (bsc#1202131).\n- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).\n- iwlwifi: pcie: retake ownership after reset (bsc#1202131).\n- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).\n- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).\n- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).\n- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).\n- iwlwifi: pnvm: print out the version properly (bsc#1202131).\n- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).\n- iwlwifi: propagate (const) type qualifier (bsc#1202131).\n- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).\n- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).\n- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).\n- iwlwifi: remove contact information (bsc#1202131).\n- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).\n- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).\n- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).\n- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).\n- iwlwifi: remove unused macros (bsc#1202131).\n- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).\n- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).\n- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).\n- iwlwifi: scan: Modify return value of a function (bsc#1202131).\n- iwlwifi: support 4-bits in MAC step value (bsc#1202131).\n- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).\n- iwlwifi: support new queue allocation command (bsc#1202131).\n- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).\n- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).\n- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).\n- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).\n- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).\n- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).\n- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).\n- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).\n- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).\n- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).\n- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).\n- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).\n- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).\n- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).\n- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).\n- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).\n- ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero (git-fixes).\n- ixgbe: fix bcast packets Rx on VF after promisc removal (git-fixes).\n- ixgbe: fix unexpected VLAN Rx in promisc mode on VF (git-fixes).\n- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- kABI workaround for spi changes (bsc#1203699).\n- kABI: Add back removed struct paca member (bsc#1203664 ltc#199236).\n- kABI: Fix after adding trace_iterator.wait_index (git-fixes).\n- kABI: Fix kABI after \u0027KVM: x86/pmu: Use different raw event masks for AMD and Intel\u0027 (git-fixes).\n- kABI: Fix kABI after SNP-Guest backport (jsc#SLE-19924, jsc#SLE-24814).\n- kABI: Fix kABI after backport Add pmc-\u003eintr to refactor kvm_perf_overflow{_intr}() (git-fixes).\n- kABI: Fix kABI after backport Always set kvm_run-\u003eif_flag (git-fixes).\n- kABI: Fix kABI after backport Forcibly leave nested virt when SMM state is toggled (git-fixes).\n- kABI: Fix kABI after backport Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).\n- kABI: fix adding another field to scsi_device (bsc#1203039).\n- kABI: reintroduce a non-inline usleep_range (git-fixes).\n- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).\n- kabi/severities: Exclude ppc kvm\n- kabi/severities: add Qlogic qed symbols\n- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471\n- kabi/severities: add hisilicon hns3 symbols\n- kabi/severities: add microchip dsa drivers\n- kabi/severities: ignore CS35L41-specific exports (bsc#1203699)\n- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.\n- kabi/severities: octeontx2 driver (jsc#SLE-24682)\n- kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).\n- kbuild: Unify options for BTF generation for vmlinux and modules (bsc#1204693).\n- kbuild: disable header exports for UML in a straightforward way (git-fixes).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kbuild: fix the modules order between drivers and libs (git-fixes).\n- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).\n- kbuild: remove the target in signal traps when interrupted (git-fixes).\n- kbuild: rpm-pkg: fix breakage when V=1 is used (git-fixes).\n- kcm: fix strp_init() order and cleanup (git-fies).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.\n- kernfs: fix use-after-free in __kernfs_remove (git-fixes).\n- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- kexec_file: drop weak attribute from functions (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kselftest/arm64: Fix validatation termination record after EXTRA_CONTEXT (git-fixes).\n- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).\n- kselftest/vm: fix tests build with old libc (git-fixes).\n- kselftest: Fix vdso_test_abi return status (git-fixes).\n- kselftest: signal all child processes (git-fixes).\n- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).\n- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).\n- landlock: Add clang-format exceptions (git-fixes).\n- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).\n- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).\n- landlock: Create find_rule() from unmask_layers() (git-fixes).\n- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).\n- landlock: Fix landlock_add_rule(2) documentation (git-fixes).\n- landlock: Fix same-layer rule unions (git-fixes).\n- landlock: Format with clang-format (git-fixes).\n- landlock: Reduce the maximum number of layers to 16 (git-fixes).\n- landlock: Use square brackets around \u0027landlock-ruleset\u0027 (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib/raid6/test: fix multiple definition linking error (git-fixes).\n- lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall (git-fixes).\n- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).\n- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).\n- livepatch: Add a missing newline character in klp_module_coming() (bsc#1071995).\n- livepatch: fix race between fork and KLP transition (bsc#1071995).\n- lkdtm: Disable return thunks in rodata.c (bsc#1190497).\n- lockd: detect and reject lock arguments that overflow (git-fixes).\n- lockdep: Correct lock_classes index mapping (git-fixes).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).\n- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).\n- loop: Check for overflow while configuring loop (git-fies).\n- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).\n- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).\n- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).\n- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).\n- mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).\n- mac80211: fix a memory leak where sta_info is not freed (git-fixes).\n- mac80211: introduce channel switch disconnect function (bsc#1202131).\n- mac80211: radiotap: Use BIT() instead of shifts (git-fixes).\n- mac802154: Fix LQI recording (git-fixes).\n- mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (git-fixes).\n- macsec: Fix invalid error code set (git-fixes).\n- macsec: add missing attribute validation for offload (git-fixes).\n- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).\n- macsec: clear encryption keys from the stack after setting up offload (git-fixes).\n- macsec: delete new rxsc when offload fails (git-fixes).\n- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).\n- macsec: fix detection of RXSCs when toggling offloading (git-fixes).\n- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).\n- macsec: fix secy-\u003en_rx_sc accounting (git-fixes).\n- macsec: limit replay window size with XPN (git-fixes).\n- macvlan: enforce a consistent minimal mtu (git-fixes).\n- mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).\n- mailbox: mpfs: account for mbox offsets while sending (git-fixes).\n- mailbox: mpfs: fix handling of the reg property (git-fixes).\n- marvell: octeontx2: build error: unknown type name \u0027u64\u0027 (jsc#SLE-24682).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).\n- media: aspeed: Fix an error handling path in aspeed_video_probe() (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).\n- media: atomisp: prevent integer overflow in sh_css_set_black_frame() (git-fixes).\n- media: cedrus: Fix endless loop in cedrus_h265_skip_bits() (git-fixes).\n- media: cedrus: Set the platform driver data earlier (git-fixes).\n- media: cedrus: h265: Fix flag name (git-fixes).\n- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).\n- media: coda: Add more H264 levels for CODA960 (git-fixes).\n- media: coda: Fix reported H264 profile (git-fixes).\n- media: cros-ec-cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).\n- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).\n- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).\n- media: dvb_vb2: fix possible out of bound access (git-fixes).\n- media: exynos4-is: Change clk_disable to clk_disable_unprepare (git-fixes).\n- media: exynos4-is: Fix PM disable depth imbalance in fimc_is_probe (git-fixes).\n- media: flexcop-usb: fix endpoint type check (git-fixes).\n- media: hantro: postproc: Fix motion vector space size (git-fixes).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: hevc: Embedded indexes in RPS (git-fixes).\n- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Add pm-sleep support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Correct some definition according specification (git-fixes).\n- media: imx-jpeg: Disable slot interrupt when frame done (git-fixes).\n- media: imx-jpeg: Fix potential array out of bounds in queue_setup (git-fixes).\n- media: imx-jpeg: Leave a blank space before the configuration data (git-fixes).\n- media: imx-jpeg: Refactor function mxc_jpeg_parse (git-fixes).\n- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).\n- media: ipu3-imgu: Fix NULL pointer dereference in active selection access (git-fixes).\n- media: mceusb: Use new usb_control_msg_*() routines (git-fixes).\n- media: mceusb: set timeout to at least timeout provided (git-fixes).\n- media: meson: vdec: add missing clk_disable_unprepare on error in vdec_hevc_start() (git-fixes).\n- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).\n- media: platform: mtk-mdp: Fix mdp_ipi_comm structure alignment.\n- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).\n- media: rkisp1: Do not pass the quantization to rkisp1_csm_config() (git-fixes).\n- media: rkisp1: Initialize color space on resizer sink and source pads (git-fixes).\n- media: rkisp1: Use correct macro for gradient registers (git-fixes).\n- media: rkisp1: Zero v4l2_subdev_format fields in when validating links (git-fixes).\n- media: rkvdec: Disable H.264 error detection (git-fixes).\n- media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: st-delta: Fix PM disable depth imbalance in delta_probe (git-fixes).\n- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: uvcvideo: Fix memory leak in uvc_gpio_parse (git-fixes).\n- media: uvcvideo: Use entity get_cur in uvc_ctrl_set (git-fixes).\n- media: v4l2-compat-ioctl32.c: zero buffer passed to v4l2_compat_get_array_args() (git-fixes).\n- media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes).\n- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).\n- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).\n- media: v4l: subdev: Fail graciously when getting try data for NULL state (git-fixes).\n- media: venus: dec: Handle the case where find_format fails (git-fixes).\n- media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check \u0027interlaced\u0027 (git-fixes).\n- media: vivid: dev-\u003ebitmap_cap wasn\u0027t freed in all cases (git-fixes).\n- media: vivid: s_fbuf: add more sanity checks (git-fixes).\n- media: vivid: set num_in/outputs to 0 if not supported (git-fixes).\n- media: vsp1: Fix offset calculation for plane cropping.\n- media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes).\n- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).\n- memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings() (git-fixes).\n- memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq() (git-fixes).\n- mfd: fsl-imx25: Fix check for platform_get_irq() errors (git-fixes).\n- mfd: intel-lpss: Add Intel Raptor Lake PCH-S PCI IDs (jsc#PED-634).\n- mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe() (git-fixes).\n- mfd: lp8788: Fix an error handling path in lp8788_irq_init() and lp8788_irq_init() (git-fixes).\n- mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: sm501: Add check for platform_driver_register() (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- minix: fix bug when opening a file with O_DIRECT (git-fixes).\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).\n- misc: cs35l41: Remove unused pdn variable (bsc#1203699).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).\n- misc: pci_endpoint_test: Aggregate params checking for xfer (git-fixes).\n- misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mlxsw: i2c: Fix initialization error flow (git-fixes).\n- mlxsw: spectrum: Clear PTP configuration after unregistering the netdevice (git-fixes).\n- mlxsw: spectrum_cnt: Reorder counter pools (git-fixes).\n- mlxsw: spectrum_router: Fix IPv4 nexthop gateway indication (git-fixes).\n- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after \u0027mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse\u0027 (git-fixes).\n- mm: Fix PASID use-after-free issue (bsc#1203908).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).\n- mmc: block: Add single read for 4k sector cards (git-fixes).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).\n- mmc: core: Fix ambiguous TRIM and DISCARD arg (git-fixes).\n- mmc: core: Fix inconsistent sd3_bus_mode at UHS-I SD voltage switch failure (git-fixes).\n- mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes).\n- mmc: core: Replace with already defined values for readability (git-fixes).\n- mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).\n- mmc: core: properly select voltage range without power cycle (git-fixes).\n- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).\n- mmc: hsq: Fix data stomping during mmc recovery (git-fixes).\n- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).\n- mmc: mmc_test: Fix removal of debugfs file (git-fixes).\n- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).\n- mmc: mxcmmc: Silence a clang warning (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).\n- mmc: sdhci-brcmstb: Enable Clock Gating to save power (git-fixes).\n- mmc: sdhci-brcmstb: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-brcmstb: Re-organize flags (git-fixes).\n- mmc: sdhci-esdhc-imx: Propagate ESDHC_FLAG_HS400* only on 8bit bus (git-fixes).\n- mmc: sdhci-esdhc-imx: correct CQHCI exit halt state check (git-fixes).\n- mmc: sdhci-esdhc-imx: use the correct host caps for MMC_CAP_8_BIT_DATA (git-fixes).\n- mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).\n- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- mmc: sdhci-pci-core: Disable ES for ASUS BIOS on Jasper Lake (git-fixes).\n- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).\n- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).\n- mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).\n- mmc: sdhci-sprd: Fix no reset data and command after voltage switch (git-fixes).\n- mmc: sdhci-tegra: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci_am654: \u0027select\u0027, not \u0027depends\u0027 REGMAP_MMIO (git-fixes).\n- mmc: sdhci_am654: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: tmio: avoid glitches when resetting (git-fixes).\n- mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes).\n- mms: sdhci-esdhc-imx: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- module: change to print useful messages from elf_validity_check() (git-fixes).\n- module: fix [e_shstrndx].sh_size=0 OOB access (git-fixes).\n- msft-hv-2570-hv_netvsc-Add-support-for-XDP_REDIRECT.patch: (bsc#1199364).\n- mt76: mt7615: do not update pm stats in case of error (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).\n- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).\n- mtd: dataflash: Add SPI ID table (git-fixes).\n- mtd: devices: docg3: check the return value of devm_ioremap() in the probe (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: parsers: bcm47xxpart: Fix halfblock reads (git-fixes).\n- mtd: parsers: bcm47xxpart: print correct offset on read error (git-fixes).\n- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).\n- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).\n- mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).\n- mtd: rawnand: fsl_elbc: Fix none ECC mode (git-fixes).\n- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).\n- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).\n- mtd: rawnand: intel: Do not re-define NAND_DATA_IFACE_CHECK_ONLY (git-fixes).\n- mtd: rawnand: intel: Read the chip-select line from the correct OF node (git-fixes).\n- mtd: rawnand: intel: Remove undocumented compatible string (git-fixes).\n- mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct() (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).\n- mtd: spi-nor: intel-spi: Disable write protection only if asked (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()\u0027s error path (git-fixes).\n- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).\n- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).\n- mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv (git-fixes).\n- n_gsm: remove unused parameters from gsm_error() (git-fixes).\n- nbd: Fix incorrect error handle when first_minor is illegal in nbd_dev_add (git-fixes).\n- net/dsa/hirschmann: Add missing of_node_get() in hellcreek_led_setup() (git-fixes).\n- net/ice: fix initializing the bitmap in the switch code (git-fixes).\n- net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).\n- net/mlx4_en: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5: CT: Fix header-rewrite re-use for tupels (git-fixes).\n- net/mlx5: Drain fw_reset when removing device (git-fixes).\n- net/mlx5e: Block rx-gro-hw feature in switchdev mode (git-fixes).\n- net/mlx5e: Disable softirq in mlx5e_activate_rq to avoid race condition (git-fixes).\n- net/mlx5e: Fix enabling sriov while tc nic rules are offloaded (git-fixes).\n- net/mlx5e: Properly block HW GRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly block LRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly disable vlan strip on non-UL reps (git-fixes).\n- net/mlx5e: Remove HW-GRO from reported features (git-fixes).\n- net/mlx5e: Remove WARN_ON when trying to offload an unsupported TLS cipher/version (git-fixes).\n- net/mlx5e: Ring the TX doorbell on DMA errors (git-fixes).\n- net/mlx5e: TC NIC mode, fix tc chains miss table (git-fixes).\n- net/mlx5e: TC, fix decap fallback to uplink when int port not supported (git-fixes).\n- net/mlx5e: Update netdev features after changing XDP state (git-fixes).\n- net/mlx5e: xsk: Account for XSK RQ UMRs when calculating ICOSQ size (git-fixes).\n- net/qla3xxx: Fix a test in ql_reset_work() (git-fixes).\n- net/smc: Avoid overwriting the copies of clcsock callback functions (git-fixes).\n- net/smc: Fix an error code in smc_lgr_create() (git-fixes).\n- net/smc: Fix possible access to freed memory in link clear (git-fixes).\n- net/smc: Fix possible leaked pernet namespace in smc_init() (git-fixes).\n- net/smc: Fix slab-out-of-bounds issue in fallback (git-fixes).\n- net/smc: Fix sock leak when release after smc_shutdown() (git-fixes).\n- net/smc: Forward wakeup to smc socket waitqueue after fallback (git-fixes).\n- net/smc: Only save the original clcsock callback functions (git-fixes).\n- net/smc: Send directly when TCP_CORK is cleared (git-fixes).\n- net/smc: kABI workarounds for struct smc_link (git-fixes).\n- net/smc: kABI workarounds for struct smc_sock (git-fixes).\n- net/smc: send directly on setting TCP_NODELAY (git-fixes).\n- net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() (git-fixes).\n- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).\n- net: altera: Fix refcount leak in altera_tse_mdio_create (git-fixes).\n- net: asix: fix \u0027can\u0027t send until first packet is send\u0027 issue (git-fixes).\n- net: atlantic: fix aq_vec index out of range error (git-fixes).\n- net: axienet: fix RX ring refill allocation failure handling (git-fixes).\n- net: axienet: reset core on initialization prior to MDIO access (git-fixes).\n- net: bcmgenet: Indicate MAC is in charge of PHY PM (git-fixes).\n- net: bcmgenet: Revert \u0027Use stronger register read/writes to assure ordering\u0027 (git-fixes).\n- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).\n- net: bcmgenet: hide status block before TX timestamping (git-fixes).\n- net: bgmac: Fix a BUG triggered by wrong bytes_compl (git-fixes).\n- net: bgmac: Fix an erroneous kfree() in bgmac_remove() (git-fixes).\n- net: bgmac: support MDIO described in DT (git-fixes).\n- net: bonding: fix possible NULL deref in rlb code (git-fixes).\n- net: bonding: fix use-after-free after 802.3ad slave unbind (git-fixes).\n- net: chelsio: cxgb4: Avoid potential negative array offset (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: dp83822: disable false carrier interrupt (git-fixes).\n- net: dp83822: disable rx error interrupt (git-fixes).\n- net: dsa: b53: Add SPI ID table (git-fixes).\n- net: dsa: bcm_sf2: Fix Wake-on-LAN with mac_link_down() (git-fixes).\n- net: dsa: bcm_sf2: force pause link settings (git-fixes).\n- net: dsa: bcm_sf2_cfp: fix an incorrect NULL check on list iterator (git-fixes).\n- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).\n- net: dsa: felix: fix tagging protocol changes with multiple CPU ports (git-fixes).\n- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).\n- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).\n- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).\n- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).\n- net: dsa: introduce helpers for iterating through ports using dp (git-fixes).\n- net: dsa: ksz9477: port mirror sniffing limited to one port (git-fixes).\n- net: dsa: lantiq_gswip: Do not set GSWIP_MII_CFG_RMII_CLK (git-fixes).\n- net: dsa: lantiq_gswip: Fix refcount leak in gswip_gphy_fw_list (git-fixes).\n- net: dsa: lantiq_gswip: fix use after free in gswip_remove() (git-fixes).\n- net: dsa: microchip: fix bridging with more than two member ports (git-fixes).\n- net: dsa: microchip: implement multi-bridge support (git-fixes).\n- net: dsa: microchip: ksz9477: fix fdb_dump last invalid entry (git-fixes).\n- net: dsa: microchip: ksz_common: Fix refcount leak bug (git-fixes).\n- net: dsa: mt7530: 1G can also support 1000BASE-X link mode (git-fixes).\n- net: dsa: mt7530: add missing of_node_put() in mt7530_setup() (git-fixes).\n- net: dsa: mv88e6060: prevent crash on an unused port (git-fixes).\n- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).\n- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).\n- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).\n- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Fix port_hidden_wait to account for port_base_addr (git-fixes).\n- net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (git-fixes).\n- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).\n- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).\n- net: dsa: mv88e6xxx: Unforce speed \u0026 duplex in mac_link_down() (git-fixes).\n- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).\n- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).\n- net: dsa: mv88e6xxx: fix \u0027do not use PHY_DETECT on internal PHY\u0027s\u0027 (git-fixes).\n- net: dsa: mv88e6xxx: use BMSR_ANEGCOMPLETE bit for filling an_complete (git-fixes).\n- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).\n- net: dsa: qca8k: fix MTU calculation (git-fixes).\n- net: dsa: restrict SMSC_LAN9303_I2C kconfig (git-fixes).\n- net: dsa: seville: register the mdiobus under devres (git-fixes).\n- net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions() (git-fixes).\n- net: dsa: sja1105: silent spi_device_id warnings (git-fixes).\n- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).\n- net: dsa: vitesse-vsc73xx: silent spi_device_id warnings (git-fixes).\n- net: emaclite: Add error handling for of_address_to_resource() (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register (git-fixes).\n- net: ethernet: mediatek: ppe: fix wrong size passed to memset() (git-fixes).\n- net: ethernet: mv643xx: Fix over zealous checking of_get_mac_address() (git-fixes).\n- net: ethernet: nixge: fix NULL dereference (git-fixes).\n- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).\n- net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link (git-fixes).\n- net: ethernet: stmmac: fix write to sgmii_adapter_base (git-fixes).\n- net: ethernet: ti: am65-cpsw: Fix devlink port register sequence (git-fixes).\n- net: ethernet: ti: am65-cpsw: fix error handling in am65_cpsw_nuss_probe() (git-fixes).\n- net: ethernet: ti: davinci_mdio: Add workaround for errata i2329 (git-fixes).\n- net: ethernet: ti: davinci_mdio: fix build for mdio bitbang uses (git-fixes).\n- net: fec: add missing of_node_put() in fec_enet_init_stop_mode() (git-fixes).\n- net: fix IFF_TX_SKB_NO_LINEAR definition (git-fixes).\n- net: ftgmac100: Hold reference returned by of_get_child_by_name() (git-fixes).\n- net: ftgmac100: access hardware register after clock ready (git-fixes).\n- net: hns3: add netdev reset check for hns3_set_tunable() (git-fixes).\n- net: hns3: clean residual vf config after disable sriov (git-fixes).\n- net: hns3: do not push link state to VF if unalive (git-fixes).\n- net: hns3: fix the concurrency between functions reading debugfs (git-fixes).\n- net: hns3: set port base vlan tbl_sta to false before removing old vlan (git-fixes).\n- net: huawei: hinic: Use devm_kcalloc() instead of devm_kzalloc() (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: ieee802154: return -EINVAL for unknown addr type (git-fixes).\n- net: ipa: do not assume SMEM is page-aligned (git-fixes).\n- net: ipa: get rid of a duplicate initialization (git-fixes).\n- net: ipa: kill ipa_cmd_pipeline_clear() (git-fixes).\n- net: ipa: record proper RX transaction count (git-fixes).\n- net: ipvtap - add __init/__exit annotations to module init/exit funcs (git-fixes).\n- net: macb: Fix PTP one step sync support (git-fixes).\n- net: macb: Increment rx bd head after allocating skb and buffer (git-fixes).\n- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- net: mana: Fix race on per-CQ variable napi work_done (git-fixes).\n- net: marvell: prestera: fix incorrect structure access (git-fixes).\n- net: mdio: Fix ENOMEM return value in BCM6368 mux bus controller (git-fixes).\n- net: mdio: fix unbalanced fwnode reference count in mdio_device_release() (git-fixes).\n- net: mdiobus: fix unbalanced node reference count (git-fixes).\n- net: moxa: get rid of asymmetry in DMA mapping/unmapping (git-fixes).\n- net: moxa: pass pdev instead of ndev to DMA functions (git-fixes).\n- net: mscc: ocelot: avoid corrupting hardware counters when moving VCAP filters (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).\n- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mscc: ocelot: fix VCAP IS2 filters matching on both lookups (git-fixes).\n- net: mscc: ocelot: fix address of SYS_COUNT_TX_AGING counter (git-fixes).\n- net: mscc: ocelot: fix all IP traffic getting trapped to CPU with PTP over IP (git-fixes).\n- net: mscc: ocelot: fix broken IP multicast flooding (git-fixes).\n- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).\n- net: mscc: ocelot: fix last VCAP IS1/IS2 filter persisting in hardware when deleted (git-fixes).\n- net: mscc: ocelot: fix missing unlock on error in ocelot_hwstamp_set() (git-fixes).\n- net: mscc: ocelot: restrict tc-trap actions to VCAP IS2 lookup 0 (git-fixes).\n- net: mscc: ocelot: set up traps for PTP packets (git-fixes).\n- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).\n- net: openvswitch: fix leak of nested actions (git-fixes).\n- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).\n- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).\n- net: pcs: xpcs: propagate xpcs_read error to xpcs_get_state_c37_sgmii (git-fixes).\n- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Do not WARN for PHY_UP state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).\n- net: phy: aquantia: wait for the suspend/resume operations to finish (git-fixes).\n- net: phy: at803x: move page selection fix to config_init (git-fixes).\n- net: phy: dp83822: disable MDI crossover status change interrupt (git-fixes).\n- net: phy: dp83867: Extend RX strap quirk for SGMII mode (git-fixes).\n- net: phy: fix null-ptr-deref while probe() failed (git-fixes).\n- net: phy: marvell: add sleep time after enabling the loopback bit (git-fixes).\n- net: phy: mscc: macsec: clear encryption keys when freeing a flow (git-fixes).\n- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).\n- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: smsc95xx: add support for Microchip EVB-LAN8670-USB (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: sparx5: depends on PTP_1588_CLOCK_OPTIONAL (git-fixes).\n- net: sparx5: uses, depends on BRIDGE or !BRIDGE (git-fixes).\n- net: stmmac: Fix unset max_speed difference between DT and non-DT platforms (git-fixes).\n- net: stmmac: Use readl_poll_timeout_atomic() in atomic state (git-fixes).\n- net: stmmac: clean up impossible condition (git-fixes).\n- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).\n- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).\n- net: stmmac: dwmac-qcom-ethqos: Enable RGMII functional clock on resume (git-fixes).\n- net: stmmac: dwmac-qcom-ethqos: add platform level clocks management (git-fixes).\n- net: stmmac: dwmac-sun8i: add missing of_node_put() in sun8i_dwmac_register_mdio_mux() (git-fixes).\n- net: stmmac: enhance XDP ZC driver level switching performance (git-fixes).\n- net: stmmac: fix dma queue left shift overflow issue (git-fixes).\n- net: stmmac: fix leaks in probe (git-fixes).\n- net: stmmac: fix off-by-one error in sanity check (git-fixes).\n- net: stmmac: fix out-of-bounds access in a selftest (git-fixes).\n- net: stmmac: fix pm runtime issue in stmmac_dvr_remove() (git-fixes).\n- net: stmmac: fix unbalanced ptp clock issue in suspend/resume flow (git-fixes).\n- net: stmmac: only enable DMA interrupts when ready (git-fixes).\n- net: stmmac: perserve TX and RX coalesce value during XDP setup (git-fixes).\n- net: stmmac: remove redunctant disable xPCS EEE call (git-fixes).\n- net: stmmac: remove unused get_addr() callback (git-fixes).\n- net: stmmac: work around sporadic tx issue on link-up (git-fixes).\n- net: sungem_phy: Add of_node_put() for reference returned by of_get_parent() (git-fixes).\n- net: systemport: Fix an error handling path in bcm_sysport_probe() (git-fixes).\n- net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null (git-fixes).\n- net: thunderbolt: Enable DMA paths only after rings are enabled (git-fixes).\n- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).\n- net: thunderbolt: fix memory leak in tbnet_open() (git-fixes).\n- net: thunderx: Fix the ACPI memory leak (git-fixes).\n- net: usb: Correct PHY handling of smsc95xx (git-fixes).\n- net: usb: Correct reset handling of smsc95xx (git-fixes).\n- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).\n- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).\n- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).\n- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).\n- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).\n- net: usb: qmi_wwan: add Telit 0x103a composition (git-fixes).\n- net: usb: r8152: Add in new Devices that are supported for Mac-Passthru (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net: wwan: iosm: Call mutex_init before locking it (git-fixes).\n- net: wwan: iosm: fix dma_alloc_coherent incompatible pointer type (git-fixes).\n- net: wwan: iosm: fix kernel test robot reported error (git-fixes).\n- net: wwan: iosm: remove pointless null check (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- netdevsim: fib: Fix reference count leak on route deletion failure (git-fixes).\n- nfc/nci: fix race with opening and closing (git-fixes).\n- nfc: fdp: Fix potential memory leak in fdp_nci_send() (git-fixes).\n- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).\n- nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() (git-fixes).\n- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).\n- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).\n- nfc: st-nci: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).\n- nfp: ethtool: fix the display error of `ethtool -m DEVNAME` (git-fixes).\n- nfsd: eliminate the NFSD_FILE_BREAK_* flags (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() (git-fixes).\n- nilfs2: fix deadlock in nilfs_count_free_blocks() (git-fixes).\n- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).\n- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).\n- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).\n- nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty (git-fixes).\n- nilfs2: fix use-after-free bug of ns_writer on remount (git-fixes).\n- nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure (git-fixes).\n- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).\n- nouveau/svm: Fix to migrate all requested pages (git-fixes).\n- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).\n- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).\n- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).\n- nvme-auth: retry command if DNR bit is not set (bsc#1201675).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: consider also host_iface when checking ip options (bsc#1199670).\n- nvme: do not print verbose errors for internal passthrough requests (bsc#1202187).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvme: implement In-Band authentication (jsc#SLE-20183).\n- nvme: kabi fixes for in-band authentication (bsc#1199086).\n- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).\n- nvmet-auth: expire authentication sessions (jsc#SLE-20183).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).\n- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).\n- ocfs2: fix a deadlock when commit trans (bsc#1202776).\n- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).\n- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).\n- octeontx2-af: Add SDP interface support (jsc#SLE-24682).\n- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).\n- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).\n- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).\n- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).\n- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).\n- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).\n- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).\n- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).\n- octeontx2-af: Apply tx nibble fixup always (git-fixes).\n- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).\n- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).\n- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).\n- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).\n- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).\n- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).\n- octeontx2-af: Fix key checking for source mac (git-fixes).\n- octeontx2-af: Fix mcam entry resource leak (git-fixes).\n- octeontx2-af: Fix spelling mistake \u0027Makesure\u0027 -\u003e \u0027Make sure\u0027 (jsc#SLE-24682).\n- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).\n- octeontx2-af: Flow control resource management (jsc#SLE-24682).\n- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).\n- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).\n- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).\n- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).\n- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).\n- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).\n- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).\n- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).\n- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).\n- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).\n- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).\n- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).\n- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).\n- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).\n- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).\n- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).\n- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).\n- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).\n- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).\n- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).\n- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).\n- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).\n- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).\n- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).\n- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).\n- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).\n- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).\n- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).\n- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).\n- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).\n- octeontx2-af: fix array bound error (jsc#SLE-24682).\n- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).\n- octeontx2-af: initialize action variable (jsc#SLE-24682).\n- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).\n- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).\n- octeontx2-af: suppress external profile loading warning (git-fixes).\n- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).\n- octeontx2-af: verify CQ context updates (jsc#SLE-24682).\n- octeontx2-nic: fix mixed module build (jsc#SLE-24682).\n- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).\n- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).\n- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).\n- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).\n- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).\n- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).\n- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).\n- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).\n- octeontx2-pf: Fix NIX_AF_TL3_TL2X_LINKX_CFG register configuration (git-fixes).\n- octeontx2-pf: Fix UDP/TCP src and dst port tc filters (git-fixes).\n- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).\n- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).\n- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).\n- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).\n- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).\n- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).\n- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).\n- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Fix egress ratelimit configuration (git-fixes).\n- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).\n- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).\n- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).\n- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).\n- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- openvswitch: Fix double reporting of drops in dropwatch (git-fixes).\n- openvswitch: Fix overreporting of drops in dropwatch (git-fixes).\n- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).\n- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).\n- openvswitch: add nf_ct_is_confirmed check before assigning the helper (git-fixes).\n- openvswitch: always update flow key after nat (git-fixes).\n- openvswitch: switch from WARN to pr_warn (git-fixes).\n- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).\n- overflow.h: restore __ab_c_size (git-fixes).\n- overflow: Implement size_t saturating arithmetic helpers (jsc#PED-1211).\n- pNFS/flexfiles: Report RDMA connection errors to the server (git-fixes).\n- padata: Fix list iterator in padata_do_serial() (git-fixes).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- parisc/sticon: fix reverse colors (bsc#1152489)\n- parisc/stifb: Fix fb_is_primary_device() only available with (bsc#1152489)\n- parisc/stifb: Implement fb_is_primary_device() (bsc#1152489)\n- parisc/stifb: Keep track of hardware path of graphics card (bsc#1152489)\n- parport_pc: Avoid FIFO port location truncation (git-fixes).\n- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).\n- phy: amlogic: phy-meson-axg-mipi-pcie-analog: Hold reference returned by of_get_parent() (git-fixes).\n- phy: qualcomm: call clk_disable_unprepare in the error handling (git-fixes).\n- phy: ralink: mt7621-pci: add sentinel to quirks table (git-fixes).\n- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).\n- phy: stm32: fix an error code in probe (git-fixes).\n- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).\n- pinctrl: Ingenic: JZ4755 bug fixes (git-fixes).\n- pinctrl: alderlake: Add Intel Alder Lake-N pin controller support (jsc#PED-676).\n- pinctrl: alderlake: Add Raptor Lake-S ACPI ID (jsc#PED-634).\n- pinctrl: alderlake: Fix register offsets for ADL-N variant (jsc#PED-676).\n- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).\n- pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).\n- pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback (git-fixes).\n- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).\n- pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).\n- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).\n- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).\n- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).\n- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).\n- pinctrl: intel: Save and restore pins in \u0027direct IRQ\u0027 mode (git-fixes).\n- pinctrl: microchip-sgpio: Correct the fwnode_irq_get() return value check (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: qcom: sc8180x: Fix gpio_wakeirq_map (git-fixes).\n- pinctrl: qcom: sc8180x: Fix wrong pin numbers (git-fixes).\n- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).\n- pinctrl: rockchip: list all pins in a possible mux route for PX30 (git-fixes).\n- pinctrl: single: Fix potential division by zero (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- pinctrl: sunxi: Fix name for A100 R_PIO (git-fixes).\n- platform/chrome: cros_ec: Always expose last resume result (git-fixes).\n- platform/chrome: cros_ec: Notify the PM of wake events during resume (git-fixes).\n- platform/chrome: cros_ec_proto: Update version on GET_NEXT_EVENT failure (git-fixes).\n- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).\n- platform/chrome: cros_ec_typec: Correct alt mode index (git-fixes).\n- platform/chrome: fix double-free in chromeos_laptop_prepare() (git-fixes).\n- platform/chrome: fix memory corruption in ioctl (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/surface: aggregator: Do not check for repeated unsequenced packets (git-fixes).\n- platform/surface: aggregator_registry: Add support for Surface Laptop Go 2 (git-fixes).\n- platform/x86/intel/pmt: Sapphire Rapids PMT errata fix (jsc#PED-2684 bsc#1205683).\n- platform/x86/intel: hid: add quirk to support Surface Go 3 (git-fixes).\n- platform/x86/intel: pmc: Do not unconditionally attach Intel PMC when virtualized (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: acer-wmi: Enable SW_TABLET_MODE on Switch V 10 (SW5-017) (git-fixes).\n- platform/x86: asus-wmi: Document the dgpu_disable sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: Document the egpu_enable sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: Document the panel_od sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: add missing pci_dev_put() in asus_wmi_set_xusb2pr() (git-fixes).\n- platform/x86: hp-wmi: Ignore Smart Experience App event (git-fixes).\n- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).\n- platform/x86: i2c-multi-instantiate: Rename it for a generic serial driver name (bsc#1203699).\n- platform/x86: ideapad-laptop: Disable touchpad_switch (git-fixes).\n- platform/x86: msi-laptop: Change DMI match / alias strings to fix module autoloading (git-fixes).\n- platform/x86: msi-laptop: Fix old-ec check for backlight registering (git-fixes).\n- platform/x86: msi-laptop: Fix resource cleanup (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: serial-multi-instantiate: Add CLSA0101 Laptop (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Add SPI support (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Reorganize I2C functions (bsc#1203699).\n- platform/x86: touchscreen_dmi: Add info for the RCA Cambio W101 v2 2-in-1 (git-fixes).\n- plip: avoid rcu debug splat (git-fixes).\n- power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() (git-fixes).\n- powerpc-pseries-mobility-set-NMI-watchdog-factor-dur.patch.\n- powerpc-watchdog-introduce-a-NMI-watchdog-s-factor.patch.\n- powerpc/64: Fix build failure with allyesconfig in book3s_64_entry.S (bsc#1194869).\n- powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).\n- powerpc/64: pcpu setup avoid reading mmu_linear_psize on 64e or radix (bsc#1204413 ltc#200176).\n- powerpc/64s: Fix build failure when CONFIG_PPC_64S_HASH_MMU is not set (bsc#1204413 ltc#200176).\n- powerpc/64s: Make flush_and_reload_slb a no-op when radix is enabled (bsc#1204413 ltc#200176).\n- powerpc/64s: Make hash MMU support configurable (bsc#1204413 ltc#200176).\n- powerpc/64s: Move and rename do_bad_slb_fault as it is not hash specific (bsc#1204413 ltc#200176).\n- powerpc/64s: Move hash MMU support code under CONFIG_PPC_64S_HASH_MMU (bsc#1204413 ltc#200176).\n- powerpc/64s: Rename hash_hugetlbpage.c to hugetlbpage.c (bsc#1204413 ltc#200176).\n- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).\n- powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc#200074).\n- powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc#SLE-13847 git-fixes).\n- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).\n- powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).\n- powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries/vas: Add VAS IRQ primary handler (bsc#1204413 ltc#200176).\n- powerpc/pseries/vas: Declare pseries_vas_fault_thread_fn() as static (bsc#1194869).\n- powerpc/pseries/vas: Pass hw_cpu_id to node associativity HCALL (bsc#1194869).\n- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Stop selecting PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176).\n- powerpc/pseries: lparcfg do not include slb_size line in radix mode (bsc#1204413 ltc#200176).\n- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: Ignore DSI error caused by the copy/paste instruction (bsc#1204413 ltc#200176).\n- powerpc: Rename PPC_NATIVE to PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176). Update config files.\n- powerpc: make memremap_compat_align 64s-only (bsc#1204413 ltc#200176).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).\n- printk: use atomic updates for klogd work (bsc#1204934).\n- printk: wake waiters for safe and NMI contexts (bsc#1204934).\n- proc: avoid integer type confusion in get_proc_long (git-fixes).\n- proc: fix a dentry lock race between release_task and lookup (git-fixes).\n- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).\n- proc: proc_skip_spaces() shouldn\u0027t think it is working on C strings (git-fixes).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).\n- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).\n- pwm: lpc18xx: Fix period handling (git-fixes).\n- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).\n- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).\n- r8152: fix the RX FIFO settings when suspending (git-fixes).\n- r8152: fix the units of some registers for RTL8156A (git-fixes).\n- random: remove useless header comment (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: core: Prevent integer underflow (git-fixes).\n- regulator: core: fix UAF in destroy_regulator() (git-fixes).\n- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).\n- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).\n- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).\n- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).\n- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).\n- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).\n- remoteproc: imx_rproc: Simplify some error message (git-fixes).\n- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).\n- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).\n- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).\n- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).\n- restore m_can_lec_type (git-fixes).\n- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Allow splice to read previous partially read pages (git-fixes).\n- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (bsc#1204705).\n- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).\n- ring-buffer: Fix race between reset page and reading page (git-fixes).\n- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).\n- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- rose: Fix NULL pointer dereference in rose_send_frame() (git-fixes).\n- rose: check NULL rose_loopback_neigh-\u003eloopback (git-fixes).\n- rpm/check-for-config-changes: add TOOLCHAIN_HAS_* to IGNORED_CONFIGS_RE This new form was added in commit b8c86872d1dc (riscv: fix detection of toolchain Zicbom support).\n- rpm/check-for-config-changes: loosen pattern for AS_HAS_* This is needed to handle CONFIG_AS_HAS_NON_CONST_LEB128.\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.\n- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.\n- rpm/kernel-source.spec.in: simplify finding of broken symlinks \u0027find -xtype l\u0027 will report them, so use that to make the search a bit faster (without using shell).\n- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).\n- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).\n- rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).\n- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).\n- rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register() (git-fixes).\n- rtmutex: Add acquire semantics for rtmutex lock acquisition slow path (bnc#1203829).\n- s390/boot: add secure boot trailer (bsc#1205257 LTC#200451).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- s390/cpumf: Handle events cycles and instructions identical (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205427 LTC#200502).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).\n- s390/hypfs: avoid error message under KVM (bsc#1032323).\n- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (bsc#1205427 LTC#200502).\n- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).\n- s390/smp: enforce lowcore protection on CPU restart (git-fixes).\n- s390/stp: clock_delta should be signed (git-fixes).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- s390: fix double free of GS and RI CBs on fork() failure (bsc#1203197 LTC#199895).\n- s390: fix nospec table alignments (git-fixes).\n- samples/landlock: Add clang-format exceptions (git-fixes).\n- samples/landlock: Fix path_list memory leak (git-fixes).\n- samples/landlock: Format with clang-format (git-fixes).\n- sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up() (git-fixes).\n- sbitmap: fix possible io hung due to lost wakeup (git-fixes).\n- sched-core-Do-not-requeue-task-on-CPU-excluded-from-cpus_mask.patch\n- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).\n- sched/fair: Remove redundant word \u0027 *\u0027 (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)\n- sched/uclamp: Fix rq-\u003euclamp_max not set on first enqueue (git-fixes)\n- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Clear ttwu_pending after enqueue_task() (git fixes (sched/core)).\n- sched: Disable sched domain debugfs creation on ppc64 unless sched_verbose is specified (bnc#1205653).\n- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh\n- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).\n- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).\n- scripts/faddr2line: Fix regression in name resolution on ppc64le (git-fixes).\n- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).\n- scripts/gdb: change kernel config dumping method (git-fixes).\n- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).\n- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).\n- scsi: Revert \u0027scsi: qla2xxx: Fix disk failure to rediscover\u0027 (git-fixes).\n- scsi: core: Add BLIST_NO_ASK_VPD_SIZE for some VDASD (bsc#1203039).\n- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).\n- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).\n- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).\n- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).\n- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix spelling mistake \u0027unsolicted\u0027 -\u003e \u0027unsolicited\u0027 (bsc#1204957).\n- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939). Dropped: patches.suse/lpfc-decouple-port_template-and-vport_template.patch\n- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).\n- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).\n- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).\n- scsi: lpfc: Set sli4_param\u0027s cmf option to zero when CMF is turned off (bsc#1204957).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).\n- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).\n- scsi: megaraid: Clear READ queue map\u0027s nr_queues (git-fixes).\n- scsi: megaraid_sas: Correct value passed to scsi_device_lookup() (git-fixes).\n- scsi: mpi3mr: Schedule IRQ kthreads only on non-RT kernels (bnc#1204498).\n- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).\n- scsi: qedf: Populate sysfs attributes for vport (git-fixes).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).\n- scsi: qla2xxx: Define static symbols (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Enhance driver tracing with separate tunable and more (bsc#1203935).\n- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).\n- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).\n- scsi: qla2xxx: Fix imbalance vha-\u003evref_count (bsc#1201958).\n- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).\n- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).\n- scsi: qla2xxx: Fix spelling mistake \u0027definiton\u0027 -\u003e \u0027definition\u0027 (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update manufacturer details (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).\n- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).\n- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).\n- scsi: scsi_transport_fc: Use %u for dev_loss_tmo (bsc#1202914).\n- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Add module param to disable managed ints (bsc#1203893).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix typo in comment (git-fixes).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: remove an extraneous \u0027to\u0027 in a comment (git-fixes).\n- scsi: ufs: core: Fix another task management completion race (git-fixes).\n- scsi: ufs: core: Fix task management completion timeout race (git-fixes).\n- scsi: ufs: ufs-pci: Add support for Intel ADL (jsc#PED-707).\n- scsi: ufs: ufs-pci: Add support for Intel MTL (jsc#PED-732).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).\n- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).\n- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).\n- selftest/vm: verify mmap addr in mremap_test (git-fixes).\n- selftest/vm: verify remap destination address in mremap_test (git-fixes).\n- selftest: tpm2: Add Client.__del__() to close /dev/tpm* handle (git-fixes).\n- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).\n- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).\n- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).\n- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).\n- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).\n- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).\n- selftests/intel_pstate: fix build for ARCH=x86_64 (git-fixes).\n- selftests/landlock: Add clang-format exceptions (git-fixes).\n- selftests/landlock: Add tests for O_PATH (git-fixes).\n- selftests/landlock: Add tests for unknown access rights (git-fixes).\n- selftests/landlock: Extend access right tests to directories (git-fixes).\n- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).\n- selftests/landlock: Format with clang-format (git-fixes).\n- selftests/landlock: Fully test file rename with \u0027remove\u0027 access (git-fixes).\n- selftests/landlock: Make tests build with old libc (git-fixes).\n- selftests/landlock: Normalize array assignment (git-fixes).\n- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).\n- selftests/livepatch: better synchronize test_klp_callbacks_busy (bsc#1071995).\n- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).\n- selftests/memfd: remove unused variable (git-fixes).\n- selftests/net: pass ipv6_args to udpgso_bench\u0027s IPv6 TCP test (git-fixes).\n- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).\n- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).\n- selftests/net: timestamping: Fix bind_phc check (git-fixes).\n- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).\n- selftests/pidfd_test: Remove the erroneous \u0027,\u0027 (git-fixes).\n- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).\n- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).\n- selftests/powerpc: Skip energy_scale_info test on older firmware (git-fixes).\n- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).\n- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).\n- selftests/rseq: Fix ppc32 missing instruction selection \u0027u\u0027 and \u0027x\u0027 for load/store (git-fixes).\n- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).\n- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).\n- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).\n- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).\n- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).\n- selftests/rseq: Introduce thread pointer getters (git-fixes).\n- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).\n- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).\n- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).\n- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).\n- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).\n- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).\n- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).\n- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).\n- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).\n- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).\n- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).\n- selftests/sgx: Treat CC as one argument (git-fixes).\n- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).\n- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).\n- selftests/x86: Add validity check and allow field splitting (git-fixes).\n- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).\n- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).\n- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).\n- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).\n- selftests: Fix IPv6 address bind tests (git-fixes).\n- selftests: Fix raw socket bind tests with VRF (git-fixes).\n- selftests: Fix the if conditions of in test_extra_filter() (git-fixes).\n- selftests: add ping test with ping_group_range tuned (git-fixes).\n- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).\n- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).\n- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).\n- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).\n- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).\n- selftests: forwarding: Fix failing tests with old libnet (git-fixes).\n- selftests: forwarding: add shebang for sch_red.sh (git-fixes).\n- selftests: forwarding: fix error message in learning_test (git-fixes).\n- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- selftests: gpio: fix gpio compiling error (git-fixes).\n- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).\n- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).\n- selftests: kvm: set rax before vmcall (git-fixes).\n- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).\n- selftests: mlxsw: resource_scale: Fix return value (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).\n- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).\n- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).\n- selftests: mptcp: fix diag instability (git-fixes).\n- selftests: mptcp: fix ipv6 routing setup (git-fixes).\n- selftests: mptcp: fix mibit vs mbit mix up (git-fixes).\n- selftests: mptcp: make sendfile selftest work (git-fixes).\n- selftests: mptcp: more stable diag tests (git-fixes).\n- selftests: mptcp: more stable simult_flows tests (git-fixes).\n- selftests: net: Correct case name (git-fixes).\n- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).\n- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).\n- selftests: net: tls: remove unused variable and code (git-fixes).\n- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).\n- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).\n- selftests: netfilter: Fix nft_fib.sh for all.rp_filter=1 (git-fixes).\n- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).\n- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).\n- selftests: netfilter: disable rp_filter on router (git-fixes).\n- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).\n- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).\n- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).\n- selftests: openat2: Add missing dependency in Makefile (git-fixes).\n- selftests: openat2: Print also errno in failure messages (git-fixes).\n- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).\n- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).\n- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).\n- selftests: rtc: Increase test timeout so that all tests run (git-fixes).\n- selftests: rtnetlink: correct xfrm policy rule in kci_test_ipsec_offload (git-fixes).\n- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).\n- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).\n- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).\n- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).\n- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).\n- selftests: vm: fix clang build error multiple output files (git-fixes).\n- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).\n- selinux: Add boundary check in put_entry() (git-fixes).\n- selinux: access superblock_security_struct in LSM blob way (git-fixes).\n- selinux: allow FIOCLEX and FIONCLEX with policy capability (git-fixes).\n- selinux: check return value of sel_make_avc_files (git-fixes).\n- selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() (git-fixes).\n- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).\n- selinux: fix double free of cond_list on error paths (git-fixes).\n- selinux: fix memleak in security_read_state_kernel() (git-fixes).\n- selinux: fix misuse of mutex_is_locked() (git-fixes).\n- selinux: use \u0027grep -E\u0027 instead of \u0027egrep\u0027 (git-fixes).\n- selinux: use correct type for context length (git-fixes).\n- serial: 8250: 8250_omap: Avoid RS485 RTS glitch on -\u003eset_termios() (git-fixes).\n- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).\n- serial: 8250: Export ICR access helpers for internal use (git-fixes).\n- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).\n- serial: 8250: Fix restoring termios speed after suspend (git-fixes).\n- serial: 8250: Flush DMA Rx on RLSI (git-fixes).\n- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).\n- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).\n- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).\n- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).\n- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).\n- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).\n- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).\n- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).\n- serial: Create uart_xmit_advance() (git-fixes).\n- serial: atmel: remove redundant assignment in rs485_config (git-fixes).\n- serial: core: move RS485 configuration tasks from drivers into core (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: fsl_lpuart: Reset prior to registration (git-fixes).\n- serial: imx: Add missing .thaw_noirq hook (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- sfc: disable softirqs for ptp TX (git-fixes).\n- sfc: fix kernel panic when creating VF (git-fixes).\n- sfc: fix use after free when disabling sriov (git-fixes).\n- signal: break out of wait loops on kthread_stop() (bsc#1204926).\n- siox: fix possible memory leak in siox_device_add() (git-fixes).\n- slimbus: qcom-ngd: cleanup in probe error path (git-fixes).\n- slimbus: qcom-ngd: use correct error in message of pdr_add_lookup() failure (git-fixes).\n- slimbus: stream: correct presence rate frequencies (git-fixes).\n- smb2: small refactor in smb2_check_message() (bsc#1193629).\n- smb3: Move the flush out of smb2_copychunk_range() into its callers (bsc#1193629).\n- smb3: add dynamic trace points for tree disconnect (bsc#1193629).\n- smb3: add trace point for SMB2_set_eof (bsc#1193629).\n- smb3: allow deferred close timeout to be configurable (bsc#1193629).\n- smb3: check xattr value length earlier (bsc#1193629).\n- smb3: clarify multichannel warning (bsc#1193629).\n- smb3: do not log confusing message when server returns no network interfaces (bsc#1193629).\n- smb3: fix empty netname context on secondary channels (bsc#1193629).\n- smb3: fix oops in calculating shash_setkey (bsc#1193629).\n- smb3: fix temporary data corruption in collapse range (bsc#1193629).\n- smb3: fix temporary data corruption in insert range (bsc#1193629).\n- smb3: improve SMB3 change notification support (bsc#1193629).\n- smb3: interface count displayed incorrectly (bsc#1193629).\n- smb3: missing inode locks in punch hole (bsc#1193629).\n- smb3: missing inode locks in zero range (bsc#1193629).\n- smb3: must initialize two ACL struct fields to zero (bsc#1193629).\n- smb3: remove unneeded null check in cifs_readdir (bsc#1193629).\n- smb3: rename encryption/decryption TFMs (bsc#1193629).\n- smb3: use filemap_write_and_wait_range instead of filemap_write_and_wait (bsc#1193629).\n- smb3: use netname when available on secondary channels (bsc#1193629).\n- smb3: workaround negprot bug in some Samba servers (bsc#1193629).\n- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).\n- soc/tegra: fuse: Drop Kconfig dependency on TEGRA20_APB_DMA (git-fixes).\n- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).\n- soc: imx8m: Enable OCOTP clock before reading the register (git-fixes).\n- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).\n- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).\n- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).\n- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).\n- soc: qcom: smem_state: Add refcounting for the \u0027state-\u003eof_node\u0027 (git-fixes).\n- soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).\n- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).\n- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).\n- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).\n- soc: sunxi: sram: Fix probe function ordering issues (git-fixes).\n- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).\n- soc: sunxi_sram: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- soundwire: cadence: Do not overwrite msg-\u003ebuf during write commands (git-fixes).\n- soundwire: intel: Initialize clock stop timeout (bsc#1205507).\n- soundwire: intel: fix error handling on dai registration issues (git-fixes).\n- soundwire: qcom: Check device status before reading devid (git-fixes).\n- soundwire: qcom: check for outanding writes before doing a read (git-fixes).\n- soundwire: qcom: fix device status array range (git-fixes).\n- soundwire: qcom: reinit broadcast completion (git-fixes).\n- speakup: fix a segfault caused by switching consoles (git-fixes).\n- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).\n- spi: Add API to count spi acpi resources (bsc#1203699).\n- spi: Create helper API to lookup ACPI info for spi device (bsc#1203699).\n- spi: Ensure that sg_table won\u0027t be used after being freed (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: Fix simplification of devm_spi_register_controller (git-fixes).\n- spi: Return deferred probe error when controller isn\u0027t yet available (bsc#1203699).\n- spi: Support selection of the index of the ACPI Spi Resource before alloc (bsc#1203699).\n- spi: dt-bindings: cadence: add missing \u0027required\u0027 (git-fixes).\n- spi: dt-bindings: zynqmp-qspi: add missing \u0027required\u0027 (git-fixes).\n- spi: dw-dma: decrease reference count in dw_spi_dma_init_mfld() (git-fixes).\n- spi: dw: Fix PM disable depth imbalance in dw_spi_bt1_probe (git-fixes).\n- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).\n- spi: meson-spicc: do not rely on busy flag in pow2 clk ops (git-fixes).\n- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).\n- spi: propagate error code to the caller of acpi_spi_device_alloc() (bsc#1203699).\n- spi: pxa2xx: Add support for Intel Meteor Lake-P (jsc#PED-732).\n- spi: pxa2xx: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).\n- spi: s3c64xx: Fix large transfers with DMA (git-fixes).\n- spi: spi-altera-dfl: Fix an error handling path (git-fixes).\n- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: stm32: Print summary \u0027callbacks suppressed\u0027 message (git-fixes).\n- spi: stm32: fix stm32_spi_prepare_mbr() that halves spi clk for every run (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).\n- spi: tegra210-quad: Fix duplicate resource error (git-fixes).\n- spmi: pmic-arb: correct duplicate APID to PPID mapping logic (git-fixes).\n- spmi: pmic-arb: do not ack and clear peripheral interrupts in cleanup_irq (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() (git-fixes).\n- staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw() (git-fixes).\n- staging: vt6655: fix potential memory leak (git-fixes).\n- staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).\n- stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove() (git-fixes).\n- stmmac: intel: Fix an error handling path in intel_eth_pci_probe() (git-fixes).\n- struct ehci_hcd: hide new element going into a hole (git-fixes).\n- struct xhci_hcd: restore member now dynamically allocated (git-fixes).\n- sunrpc: fix expiry of auth creds (git-fixes).\n- supported.conf: Add cs_dsp firmware module (bsc#1203699)\n- supported.conf: Add drivers/virt/coco/sevguest/sevguest\n- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and \t\tchanged all octeontx2 modules as supported (jsc#SLE-24682)\n- supported.conf: mark drivers/nvme/common as supported (jsc#SLE-20183)\n- supported.conf: mark lib/objagg supported as dependency of mlxsw\n- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)\n- supported.conf: mark spi-pxa2xx-platform as supported (bsc#1203699) It\u0027s required for the sound on recent Intel machines\n- tee: optee: do not check memref size on return from Secure World (git-fixes).\n- tee: tee_get_drvdata(): fix description of return value (git-fixes).\n- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).\n- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).\n- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).\n- tests: fix idmapped mount_setattr test (git-fixes).\n- thermal/drivers/qcom/tsens-v0_1: Fix MSM8939 fourth sensor hw_id (git-fixes).\n- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thermal: cpufreq_cooling: Check the policy first in cpufreq_cooling_register() (git-fixes).\n- thermal: int340x: Mode setting with new OS handshake (jsc#PED-678).\n- thermal: int340x: Update OS policy capability handshake (jsc#PED-678).\n- thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes).\n- thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Add DP OUT resource when DP tunnel is discovered (git-fixes).\n- thunderbolt: Add back Intel Falcon Ridge end-to-end flow control workaround (git-fixes).\n- thunderbolt: Add missing device ID to tb_switch_is_alpine_ridge() (git-fixes).\n- thunderbolt: Add support for Intel Maple Ridge single port controller (git-fixes).\n- thunderbolt: Add support for Intel Raptor Lake (jsc#PED-634).\n- thunderbolt: Disable LTTPR on Intel Titan Ridge (git-fixes).\n- thunderbolt: Explicitly enable lane adapter hotplug events at startup (git-fixes).\n- thunderbolt: Explicitly reset plug events delay back to USB4 spec value (git-fixes).\n- thunderbolt: Fix buffer allocation of devices with no DisplayPort adapters (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- timers: implement usleep_idle_range() (git-fixes).\n- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).\n- tools/nolibc: fix incorrect truncation of exit code (git-fixes).\n- tools/nolibc: i386: fix initial stack alignment (git-fixes).\n- tools/nolibc: x86-64: Fix startup code bug (git-fixes).\n- tools/testing/scatterlist: add missing defines (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tools: hv: Remove an extraneous \u0027the\u0027 (git-fixes).\n- tools: hv: kvp: remove unnecessary (void*) conversions (git-fixes).\n- tools: iio: iio_generic_buffer: Fix read size (git-fixes).\n- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).\n- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).\n- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).\n- tracing/osnoise: Fix duration type (git-fixes).\n- tracing/osnoise: Fix possible recursive locking in stop_per_cpu_kthreads (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing/ring-buffer: Have polling block on watermark (git-fixes).\n- tracing: Add \u0027(fault)\u0027 name injection to kernel probes (git-fixes).\n- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).\n- tracing: Add tracing_reset_all_online_cpus_unlocked() function (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).\n- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).\n- tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() (git-fixes).\n- tracing: Fix memory leak in tracing_read_pipe() (git-fixes).\n- tracing: Fix reading strings from synthetic events (git-fixes).\n- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).\n- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).\n- tracing: Free buffers when a used dynamic event is removed (git-fixes).\n- tracing: Have filter accept \u0027common_cpu\u0027 to be consistent (git-fixes).\n- tracing: Move duplicate code of trace_kprobe/eprobe.c into header (git-fixes).\n- tracing: Replace deprecated CPU-hotplug functions (git-fixes).\n- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).\n- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).\n- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).\n- tracing: Wake up waiters when tracing is disabled (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tracing: kprobe: Fix kprobe event gen test module on exit (git-fixes).\n- tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Make gen test module work in arm and riscv (git-fixes).\n- tty: 8250: Add support for Brainboxes PX cards (git-fixes).\n- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).\n- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).\n- tty: n_gsm: Modify cr bit value when config requester (git-fixes).\n- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).\n- tty: n_gsm: Save dlci address open status when config requester (git-fixes).\n- tty: n_gsm: add sanity check for gsm-\u003ereceive in gsm_receive_buf() (git-fixes).\n- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).\n- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).\n- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).\n- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).\n- tty: n_gsm: fix DM command (git-fixes).\n- tty: n_gsm: fix broken virtual tty handling (git-fixes).\n- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).\n- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).\n- tty: n_gsm: fix decoupled mux resource (git-fixes).\n- tty: n_gsm: fix encoding of command/response bit (git-fixes).\n- tty: n_gsm: fix flow control handling in tx path (git-fixes).\n- tty: n_gsm: fix frame reception handling (git-fixes).\n- tty: n_gsm: fix incorrect UA handling (git-fixes).\n- tty: n_gsm: fix insufficient txframe size (git-fixes).\n- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).\n- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).\n- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).\n- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).\n- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).\n- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).\n- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).\n- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).\n- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).\n- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).\n- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).\n- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).\n- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).\n- tty: n_gsm: fix reset fifo race condition (git-fixes).\n- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).\n- tty: n_gsm: fix restart handling via CLD command (git-fixes).\n- tty: n_gsm: fix sleep-in-atomic-context bug in gsm_control_send (git-fixes).\n- tty: n_gsm: fix software flow control handling (git-fixes).\n- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).\n- tty: n_gsm: fix tty registration before control channel open (git-fixes).\n- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).\n- tty: n_gsm: fix wrong DLCI release order (git-fixes).\n- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).\n- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).\n- tty: n_gsm: fix wrong command retry handling (git-fixes).\n- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).\n- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).\n- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).\n- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: atmel: Preserve previous USART mode if RS485 disabled (git-fixes).\n- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).\n- tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (git-fixes).\n- tty: serial: fsl_lpuart: do not break the on-going transfer when global reset (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- tty: xilinx_uartps: Fix the ignore_status (git-fixes).\n- tun: avoid double free in tun_free_netdev (git-fixes).\n- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).\n- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).\n- uaccess: fix type mismatch warnings from access_ok() (git-fixes).\n- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).\n- uas: ignore UAS for Thinkplus chips (git-fixes).\n- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).\n- ucounts: Fix rlimit max values check (git-fixes).\n- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).\n- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).\n- ucounts: In set_cred_ucounts assume new-\u003eucounts is non-NULL (git-fixes).\n- udf: Fix crash after seekdir (bsc#1194592).\n- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).\n- udmabuf: Set ubuf-\u003esg = NULL if the creation of sg table fails (git-fixes).\n- udmabuf: add back sanity check (git-fixes).\n- units: Add SI metric prefix definitions (git-fixes).\n- units: add the HZ macros (git-fixes).\n- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).\n- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- usb.h: struct usb_device: hide new member (git-fixes).\n- usb/hcd: Fix dma_map_sg error check (git-fixes).\n- usb: Drop commas after SoC match table sentinels (git-fixes).\n- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).\n- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).\n- usb: bdc: change state when port disconnected (git-fixes).\n- usb: cdc-wdm: Use skb_put_data() instead of skb_put/memcpy pair (git-fixes).\n- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).\n- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: change place of \u0027priv_ep\u0027 assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).\n- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).\n- usb: cdns3: fix random warning message when driver load (git-fixes).\n- usb: cdns3: host: fix endless superspeed hub port reset (git-fixes).\n- usb: cdnsp: Fix issue with Clear Feature Halt Endpoint (git-fixes).\n- usb: cdnsp: fix issue with ZLP - added TD_SIZE = 1 (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: common: debug: Check non-standard control requests (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).\n- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).\n- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).\n- usb: dwc3: core: Enable GUCTL1 bit 10 for fixing termination error after resume bug (git-fixes).\n- usb: dwc3: core: leave default DMA if the controller does not support 64-bit DMA (git-fixes).\n- usb: dwc3: disable USB core PHY management (git-fixes).\n- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).\n- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).\n- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).\n- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).\n- usb: dwc3: gadget: Do not modify GEVNTCOUNT in pullup() (git-fixes).\n- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).\n- usb: dwc3: gadget: Refactor pullup() (git-fixes).\n- usb: dwc3: gadget: Return -ESHUTDOWN on ep disable (git-fixes).\n- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).\n- usb: dwc3: gadget: conditionally remove requests (git-fixes).\n- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).\n- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).\n- usb: dwc3: pci: Add support for Intel Raptor Lake (git-fixes).\n- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: ehci: Fix a function name in comments (git-fixes).\n- usb: gadget: bdc: fix typo in comment (git-fixes).\n- usb: gadget: f_fs: stricter integer overflow checks (git-fixes).\n- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).\n- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).\n- usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: host: xhci-plat: suspend and resume clocks (git-fixes).\n- usb: host: xhci-plat: suspend/resume clks for brcm (git-fixes).\n- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() (git-fixes).\n- usb: host: xhci: fix a comment typo in xhci_mem_init() (git-fixes).\n- usb: host: xhci: use ffs() in xhci_mem_init() (git-fixes).\n- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- usb: hub: avoid warm port reset during USB3 disconnect (git-fixes).\n- usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).\n- usb: mon: make mmapped memory read only (git-fixes).\n- usb: mtu3: fix failed runtime suspend in host only mode (git-fixes).\n- usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).\n- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: smsc: use eth_hw_addr_set() (git-fixes).\n- usb: storage: Add ASUS \u0026lt;0x0b05:0x1932\u003e to IGNORE_UAS (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: intel_pmc_mux: Add new ACPI ID for Meteor Lake IOM device (git-fixes).\n- usb: typec: mux: Enter safe mode only when pins need to be reconfigured (git-fixes).\n- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).\n- usb: typec: tcpm: fix typo in comment (git-fixes).\n- usb: typec: tipd: Add an additional overflow check (git-fixes).\n- usb: typec: tipd: Do not read/write more bytes than required (git-fixes).\n- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- usb: typec: ucsi: Remove incorrect warning (git-fixes).\n- usb: xhci-mtk: check boundary before check tt (git-fixes).\n- usb: xhci-mtk: relax TT periodic bandwidth allocation (git-fixes).\n- usb: xhci-mtk: update fs bus bandwidth by bw_budget_table (git-fixes).\n- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).\n- usb: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: Run unregister_netdev() before unbind() again (git-fixes).\n- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).\n- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).\n- usbnet: smsc95xx: Do not reset PHY behind PHY driver\u0027s back (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).\n- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027\n- vboxguest: Do not use devm for irq (git-fixes).\n- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).\n- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- vfio/type1: Unpin zero pages (git-fixes).\n- vfio: Clear the caps-\u003ebuf to NULL after free (git-fixes).\n- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).\n- video/fbdev/stifb: Implement the stifb_fillrect() function (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: i740fb: Error out if \u0027pixclock\u0027 equals zero (git-fixes).\n- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virt: Add SEV-SNP guest driver (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to derive key (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to get extended report (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix bool function returning negative value (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix return value check in alloc_shared_pages() (jsc#SLE-19924, jsc#SLE-24814).\n- virt: vbox: convert to use dev_groups (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmxnet3: Implement ethtool\u0027s get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: correctly report encapsulated LRO packet (git-fixes).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use correct intrConf reference when using extended queues (git-fixes).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).\n- vrf: fix packet sniffing for traffic originating from ip tunnels (git-fixes).\n- vsock/virtio: enable VQs early on probe (git-fixes).\n- vsock/virtio: initialize vdev-\u003epriv before using VQs (git-fixes).\n- vsock/virtio: read the negotiated features before using VQs (git-fixes).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vsock: fix possible infinite sleep in vsock_connectible_wait_data() (git-fixes).\n- vsock: remove the unused \u0027wait\u0027 in vsock_connectible_recvmsg() (git-fixes).\n- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- watch-queue: remove spurious double semicolon (git-fixes).\n- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).\n- watch_queue: Fix missing rcu annotation (git-fixes).\n- watchdog-export-lockup_detector_reconfigure.patch.\n- watchdog/hpwdt: Include nmi.h only if CONFIG_HPWDT_NMI_DECODING (git-fixes).\n- watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure (git-fixes).\n- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- watchqueue: make sure to serialize \u0027wqueue-\u003edefunct\u0027 properly (git-fixes).\n- wifi: airo: do not assign -1 to unsigned char (git-fixes).\n- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).\n- wifi: ath11k: Fix QCN9074 firmware boot on x86 (git-fixes).\n- wifi: ath11k: avoid deadlock during regulatory update in ath11k_regd_update() (git-fixes).\n- wifi: ath11k: fix number of VHT beamformee spatial streams (git-fixes).\n- wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).\n- wifi: brcmfmac: fix invalid address access when enabling SCAN log level (git-fixes).\n- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (git-fixes).\n- wifi: cfg80211/mac80211: reject bad MBSSID elements (git-fixes).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: cfg80211: do not allow multi-BSSID in S1G (git-fixes).\n- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).\n- wifi: cfg80211: fix ieee80211_data_to_8023_exthdr handling of small packets (git-fixes).\n- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).\n- wifi: cfg80211: silence a sparse RCU warning (git-fixes).\n- wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other cases) (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).\n- wifi: mac80211: Fix ack frame idr leak when mesh has no route (git-fixes).\n- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).\n- wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on fast-rx (git-fixes).\n- wifi: mac80211: fix decap offload for stations on AP_VLAN interfaces (git-fixes).\n- wifi: mac80211: fix memory free error when registering wiphy fail (git-fixes).\n- wifi: mac80211: fix probe req HE capabilities access (git-fixes).\n- wifi: mac80211: fix regression with non-QoS drivers (git-fixes).\n- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).\n- wifi: mac80211_hwsim: check length for virtio packets (git-fixes).\n- wifi: mac80211_hwsim: fix debugfs attribute ps with rc table support (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).\n- wifi: mt76: fix reading current per-tid starting sequence number for aggregation (git-fixes).\n- wifi: mt76: mt7615: add mt7615_mutex_acquire/release in mt7615_sta_set_decap_offload (git-fixes).\n- wifi: mt76: mt7915: do not check state before configuring implicit beamform (git-fixes).\n- wifi: mt76: mt7921: reset msta-\u003eairtime_ac while clearing up hw value (git-fixes).\n- wifi: mt76: sdio: fix transmitting packet hangs (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).\n- wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).\n- wifi: rt2x00: set SoC wmac clock register (git-fixes).\n- wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).\n- wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).\n- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).\n- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).\n- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).\n- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).\n- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).\n- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).\n- wifi: rtlwifi: 8192de: correct checking of IQK reload (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).\n- wifi: rtw88: add missing destroy_workqueue() on error path in rtw_core_init() (git-fixes).\n- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).\n- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).\n- wifi: wext: use flex array destination for memcpy() (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute (git-fixes).\n- wifi: wilc1000: validate number of channels (git-fixes).\n- wifi: wilc1000: validate pairwise and authentication suite offsets (git-fixes).\n- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).\n- wireless: Remove redundant \u0027flush_workqueue()\u0027 calls (bsc#1202131).\n- workqueue: do not skip lockdep work dependency in cancel_work_sync() (git-fixes).\n- wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new() (git-fixes).\n- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).\n- x86/Xen: streamline (and fix) PV CPU enumeration (git-fixes).\n- x86/boot: Add Confidential Computing type to setup_data (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Add a pointer to Confidential Computing blob in bootparams (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Do not propagate uninitialized boot_params-\u003ecc_blob_address (bsc#1204970).\n- x86/boot: Fix the setup data types max limit (bsc#1204970).\n- x86/boot: Introduce helpers for MSR reads/writes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Put globals that are accessed early into the .data section (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Use MSR read/write helpers instead of inline assembly (jsc#SLE-19924, jsc#SLE-24814).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/compressed/64: Add identity mapping for Confidential Computing blob (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Add identity mappings for setup_data entries (bsc#1204970).\n- x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Detect/setup SEV/SME features earlier during boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI config table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI detection to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI kexec handling into common code (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI system table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI vendor table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add helper for validating pages in the decompression stage (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Export and rename add_identity_map() (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/entry: Work around Clang __bdos() bug (git-fixes).\n- x86/extable: Extend extable functionality (git-fixes).\n- x86/fpu: Drop fpregs lock before inheriting FPU permissions (bnc#1205282).\n- x86/futex: Remove .fixup usage (git-fixes).\n- x86/head/64: Re-enable stack protection (jsc#SLE-19924, jsc#SLE-24814).\n- x86/hyperv: Disable hardlockup detector by default in Hyper-V guests (git-fixes).\n- x86/hyperv: Fix \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: Update \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: fix invalid writes to MSRs during root partition kexec (git-fixes).\n- x86/ibt,ftrace: Make function-graph play nice (bsc#1203969).\n- x86/kernel: Mark the .bss..decrypted section as shared in the RMP table (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kernel: Validate ROM memory before accessing when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/mm: Extend cc_attr to include AMD SEV-SNP (jsc#SLE-19924, jsc#SLE-24814).\n- x86/mm: Validate memory when changing the C-bit (jsc#SLE-19924, jsc#SLE-24814).\n- x86/olpc: fix \u0027logical not is only applied to the left hand side\u0027 (git-fixes).\n- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).\n- x86/sev: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a helper for the PVALIDATE instruction (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a sev= cmdline option (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add helper for validating pages in early enc attribute changes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add missing __init annotations to SEV init routines (jsc#SLE-19924 jsc#SLE-24814).\n- x86/sev: Annotate stack change in the #VC handler (bsc#1204970).\n- x86/sev: Check SEV-SNP features support (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Check the VMPL level (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).\n- x86/sev: Detect/setup SEV/SME features earlier in boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Do not use cc_platform_has() for early SEV-SNP calls (bsc#1204970).\n- x86/sev: Get the AP jump table address from secrets page (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Move MSR-based VMGEXITs for CPUID to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Provide support for SNP guest request NAEs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register SEV-SNP guest request platform device (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Remove duplicated assignment to variable info (bsc#1204970).\n- x86/sev: Save the negotiated GHCB version (bsc#1190497).\n- x86/sev: Use SEV-SNP AP creation to start secondary CPUs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Use firmware-validated CPUID for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/uaccess: Implement macros for CMPXCHG on user addresses (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen-blkback: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkback: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkback: fix persistent grants negotiation (git-fixes).\n- xen-blkfront: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkfront: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkfront: Cache feature_persistent value before advertisement (git-fixes).\n- xen-blkfront: Handle NULL gendisk (git-fixes).\n- xen-netback: only remove \u0027hotplug-status\u0027 when the vif is actually destroyed (git-fixes).\n- xen/gntdev: Accommodate VMA splitting (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/gntdev: Prevent leaking grants (git-fixes).\n- xen/gntdev: fix unmap notification order (git-fixes).\n- xen/grants: prevent integer overflow in gnttab_dma_alloc_pages() (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/usb: do not use arbitrary_virt_to_machine() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu\u003e=32 (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).\n- xfs: convert XLOG_FORCED_SHUTDOWN() to xlog_is_shutdown() (git-fixes).\n- xfs: fix perag reference leak on iteration race with growfs (git-fixes).\n- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).\n- xfs: fix use-after-free in xattr node block inactivation (git-fixes).\n- xfs: fix xfs_ifree() error handling to not leak perag ref (git-fixes).\n- xfs: fold perag loop iteration logic into helper function (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: only bother with sync_filesystem during readonly remount (git-fixes).\n- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).\n- xfs: rename the next_agno perag iteration variable (git-fixes).\n- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).\n- xfs: reserve quota for dir expansion when linking/unlinking files (bsc#1205616).\n- xfs: reserve quota for target dir expansion when renaming files (bsc#1205679).\n- xfs: revert \u0027xfs: actually bump warning counts when we send warnings\u0027 (git-fixes).\n- xfs: terminate perag iteration reliably on agcount (git-fixes).\n- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xfs: use setattr_copy to set vfs inode attributes (git-fixes).\n- xhci-pci: Set runtime PM as default policy on all xHC 1.2 or later devices (git-fixes).\n- xhci: Add quirk to reset host back to default state at shutdown (git-fixes).\n- xhci: Allocate separate command structures for each LPM command (git-fixes).\n- xhci: Do not show warning for reinit on known broken suspend (git-fixes).\n- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).\n- xhci: Set HCD flag to defer primary roothub registration (git-fixes).\n- xhci: dbc: Fix memory leak in xhci_alloc_dbc() (git-fixes).\n- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).\n- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).\n- xhci: dbc: refactor xhci_dbc_init() (git-fixes).\n- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).\n- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).\n- zonefs: Clear inode information flags on inode creation (git-fixes).\n- zonefs: Fix management of open zones (git-fixes).\n- zonefs: add MODULE_ALIAS_FS (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4617,SUSE-SLE-Micro-5.3-2022-4617,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4617,SUSE-SLE-Module-RT-15-SP4-2022-4617,openSUSE-Leap-Micro-5.3-2022-4617,openSUSE-SLE-15.4-2022-4617",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4617-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4617-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224617-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4617-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html"
},
{
"category": "self",
"summary": "SUSE Bug 1023051",
"url": "https://bugzilla.suse.com/1023051"
},
{
"category": "self",
"summary": "SUSE Bug 1032323",
"url": "https://bugzilla.suse.com/1032323"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164051",
"url": "https://bugzilla.suse.com/1164051"
},
{
"category": "self",
"summary": "SUSE Bug 1177471",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1188238",
"url": "https://bugzilla.suse.com/1188238"
},
{
"category": "self",
"summary": "SUSE Bug 1189297",
"url": "https://bugzilla.suse.com/1189297"
},
{
"category": "self",
"summary": "SUSE Bug 1189999",
"url": "https://bugzilla.suse.com/1189999"
},
{
"category": "self",
"summary": "SUSE Bug 1190256",
"url": "https://bugzilla.suse.com/1190256"
},
{
"category": "self",
"summary": "SUSE Bug 1190497",
"url": "https://bugzilla.suse.com/1190497"
},
{
"category": "self",
"summary": "SUSE Bug 1190969",
"url": "https://bugzilla.suse.com/1190969"
},
{
"category": "self",
"summary": "SUSE Bug 1192968",
"url": "https://bugzilla.suse.com/1192968"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1194023",
"url": "https://bugzilla.suse.com/1194023"
},
{
"category": "self",
"summary": "SUSE Bug 1194592",
"url": "https://bugzilla.suse.com/1194592"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1194904",
"url": "https://bugzilla.suse.com/1194904"
},
{
"category": "self",
"summary": "SUSE Bug 1195480",
"url": "https://bugzilla.suse.com/1195480"
},
{
"category": "self",
"summary": "SUSE Bug 1195917",
"url": "https://bugzilla.suse.com/1195917"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1196444",
"url": "https://bugzilla.suse.com/1196444"
},
{
"category": "self",
"summary": "SUSE Bug 1196616",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "self",
"summary": "SUSE Bug 1196632",
"url": "https://bugzilla.suse.com/1196632"
},
{
"category": "self",
"summary": "SUSE Bug 1196867",
"url": "https://bugzilla.suse.com/1196867"
},
{
"category": "self",
"summary": "SUSE Bug 1196869",
"url": "https://bugzilla.suse.com/1196869"
},
{
"category": "self",
"summary": "SUSE Bug 1197158",
"url": "https://bugzilla.suse.com/1197158"
},
{
"category": "self",
"summary": "SUSE Bug 1197391",
"url": "https://bugzilla.suse.com/1197391"
},
{
"category": "self",
"summary": "SUSE Bug 1197659",
"url": "https://bugzilla.suse.com/1197659"
},
{
"category": "self",
"summary": "SUSE Bug 1197755",
"url": "https://bugzilla.suse.com/1197755"
},
{
"category": "self",
"summary": "SUSE Bug 1197756",
"url": "https://bugzilla.suse.com/1197756"
},
{
"category": "self",
"summary": "SUSE Bug 1197757",
"url": "https://bugzilla.suse.com/1197757"
},
{
"category": "self",
"summary": "SUSE Bug 1197763",
"url": "https://bugzilla.suse.com/1197763"
},
{
"category": "self",
"summary": "SUSE Bug 1198189",
"url": "https://bugzilla.suse.com/1198189"
},
{
"category": "self",
"summary": "SUSE Bug 1198410",
"url": "https://bugzilla.suse.com/1198410"
},
{
"category": "self",
"summary": "SUSE Bug 1198577",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "self",
"summary": "SUSE Bug 1198702",
"url": "https://bugzilla.suse.com/1198702"
},
{
"category": "self",
"summary": "SUSE Bug 1198971",
"url": "https://bugzilla.suse.com/1198971"
},
{
"category": "self",
"summary": "SUSE Bug 1199086",
"url": "https://bugzilla.suse.com/1199086"
},
{
"category": "self",
"summary": "SUSE Bug 1199364",
"url": "https://bugzilla.suse.com/1199364"
},
{
"category": "self",
"summary": "SUSE Bug 1199515",
"url": "https://bugzilla.suse.com/1199515"
},
{
"category": "self",
"summary": "SUSE Bug 1199670",
"url": "https://bugzilla.suse.com/1199670"
},
{
"category": "self",
"summary": "SUSE Bug 1199904",
"url": "https://bugzilla.suse.com/1199904"
},
{
"category": "self",
"summary": "SUSE Bug 1200015",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "self",
"summary": "SUSE Bug 1200058",
"url": "https://bugzilla.suse.com/1200058"
},
{
"category": "self",
"summary": "SUSE Bug 1200268",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "self",
"summary": "SUSE Bug 1200288",
"url": "https://bugzilla.suse.com/1200288"
},
{
"category": "self",
"summary": "SUSE Bug 1200301",
"url": "https://bugzilla.suse.com/1200301"
},
{
"category": "self",
"summary": "SUSE Bug 1200313",
"url": "https://bugzilla.suse.com/1200313"
},
{
"category": "self",
"summary": "SUSE Bug 1200431",
"url": "https://bugzilla.suse.com/1200431"
},
{
"category": "self",
"summary": "SUSE Bug 1200465",
"url": "https://bugzilla.suse.com/1200465"
},
{
"category": "self",
"summary": "SUSE Bug 1200494",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "self",
"summary": "SUSE Bug 1200544",
"url": "https://bugzilla.suse.com/1200544"
},
{
"category": "self",
"summary": "SUSE Bug 1200567",
"url": "https://bugzilla.suse.com/1200567"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1200644",
"url": "https://bugzilla.suse.com/1200644"
},
{
"category": "self",
"summary": "SUSE Bug 1200651",
"url": "https://bugzilla.suse.com/1200651"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200788",
"url": "https://bugzilla.suse.com/1200788"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1200868",
"url": "https://bugzilla.suse.com/1200868"
},
{
"category": "self",
"summary": "SUSE Bug 1200869",
"url": "https://bugzilla.suse.com/1200869"
},
{
"category": "self",
"summary": "SUSE Bug 1200870",
"url": "https://bugzilla.suse.com/1200870"
},
{
"category": "self",
"summary": "SUSE Bug 1200871",
"url": "https://bugzilla.suse.com/1200871"
},
{
"category": "self",
"summary": "SUSE Bug 1200872",
"url": "https://bugzilla.suse.com/1200872"
},
{
"category": "self",
"summary": "SUSE Bug 1200873",
"url": "https://bugzilla.suse.com/1200873"
},
{
"category": "self",
"summary": "SUSE Bug 1201019",
"url": "https://bugzilla.suse.com/1201019"
},
{
"category": "self",
"summary": "SUSE Bug 1201308",
"url": "https://bugzilla.suse.com/1201308"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1201310",
"url": "https://bugzilla.suse.com/1201310"
},
{
"category": "self",
"summary": "SUSE Bug 1201361",
"url": "https://bugzilla.suse.com/1201361"
},
{
"category": "self",
"summary": "SUSE Bug 1201427",
"url": "https://bugzilla.suse.com/1201427"
},
{
"category": "self",
"summary": "SUSE Bug 1201442",
"url": "https://bugzilla.suse.com/1201442"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1201489",
"url": "https://bugzilla.suse.com/1201489"
},
{
"category": "self",
"summary": "SUSE Bug 1201610",
"url": "https://bugzilla.suse.com/1201610"
},
{
"category": "self",
"summary": "SUSE Bug 1201675",
"url": "https://bugzilla.suse.com/1201675"
},
{
"category": "self",
"summary": "SUSE Bug 1201725",
"url": "https://bugzilla.suse.com/1201725"
},
{
"category": "self",
"summary": "SUSE Bug 1201726",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "self",
"summary": "SUSE Bug 1201768",
"url": "https://bugzilla.suse.com/1201768"
},
{
"category": "self",
"summary": "SUSE Bug 1201865",
"url": "https://bugzilla.suse.com/1201865"
},
{
"category": "self",
"summary": "SUSE Bug 1201940",
"url": "https://bugzilla.suse.com/1201940"
},
{
"category": "self",
"summary": "SUSE Bug 1201941",
"url": "https://bugzilla.suse.com/1201941"
},
{
"category": "self",
"summary": "SUSE Bug 1201948",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "self",
"summary": "SUSE Bug 1201954",
"url": "https://bugzilla.suse.com/1201954"
},
{
"category": "self",
"summary": "SUSE Bug 1201956",
"url": "https://bugzilla.suse.com/1201956"
},
{
"category": "self",
"summary": "SUSE Bug 1201958",
"url": "https://bugzilla.suse.com/1201958"
},
{
"category": "self",
"summary": "SUSE Bug 1202095",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "self",
"summary": "SUSE Bug 1202096",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202113",
"url": "https://bugzilla.suse.com/1202113"
},
{
"category": "self",
"summary": "SUSE Bug 1202131",
"url": "https://bugzilla.suse.com/1202131"
},
{
"category": "self",
"summary": "SUSE Bug 1202154",
"url": "https://bugzilla.suse.com/1202154"
},
{
"category": "self",
"summary": "SUSE Bug 1202187",
"url": "https://bugzilla.suse.com/1202187"
},
{
"category": "self",
"summary": "SUSE Bug 1202262",
"url": "https://bugzilla.suse.com/1202262"
},
{
"category": "self",
"summary": "SUSE Bug 1202265",
"url": "https://bugzilla.suse.com/1202265"
},
{
"category": "self",
"summary": "SUSE Bug 1202312",
"url": "https://bugzilla.suse.com/1202312"
},
{
"category": "self",
"summary": "SUSE Bug 1202341",
"url": "https://bugzilla.suse.com/1202341"
},
{
"category": "self",
"summary": "SUSE Bug 1202346",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "self",
"summary": "SUSE Bug 1202347",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202393",
"url": "https://bugzilla.suse.com/1202393"
},
{
"category": "self",
"summary": "SUSE Bug 1202447",
"url": "https://bugzilla.suse.com/1202447"
},
{
"category": "self",
"summary": "SUSE Bug 1202471",
"url": "https://bugzilla.suse.com/1202471"
},
{
"category": "self",
"summary": "SUSE Bug 1202558",
"url": "https://bugzilla.suse.com/1202558"
},
{
"category": "self",
"summary": "SUSE Bug 1202623",
"url": "https://bugzilla.suse.com/1202623"
},
{
"category": "self",
"summary": "SUSE Bug 1202636",
"url": "https://bugzilla.suse.com/1202636"
},
{
"category": "self",
"summary": "SUSE Bug 1202672",
"url": "https://bugzilla.suse.com/1202672"
},
{
"category": "self",
"summary": "SUSE Bug 1202681",
"url": "https://bugzilla.suse.com/1202681"
},
{
"category": "self",
"summary": "SUSE Bug 1202685",
"url": "https://bugzilla.suse.com/1202685"
},
{
"category": "self",
"summary": "SUSE Bug 1202686",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "self",
"summary": "SUSE Bug 1202700",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "self",
"summary": "SUSE Bug 1202710",
"url": "https://bugzilla.suse.com/1202710"
},
{
"category": "self",
"summary": "SUSE Bug 1202711",
"url": "https://bugzilla.suse.com/1202711"
},
{
"category": "self",
"summary": "SUSE Bug 1202712",
"url": "https://bugzilla.suse.com/1202712"
},
{
"category": "self",
"summary": "SUSE Bug 1202713",
"url": "https://bugzilla.suse.com/1202713"
},
{
"category": "self",
"summary": "SUSE Bug 1202715",
"url": "https://bugzilla.suse.com/1202715"
},
{
"category": "self",
"summary": "SUSE Bug 1202716",
"url": "https://bugzilla.suse.com/1202716"
},
{
"category": "self",
"summary": "SUSE Bug 1202757",
"url": "https://bugzilla.suse.com/1202757"
},
{
"category": "self",
"summary": "SUSE Bug 1202758",
"url": "https://bugzilla.suse.com/1202758"
},
{
"category": "self",
"summary": "SUSE Bug 1202759",
"url": "https://bugzilla.suse.com/1202759"
},
{
"category": "self",
"summary": "SUSE Bug 1202761",
"url": "https://bugzilla.suse.com/1202761"
},
{
"category": "self",
"summary": "SUSE Bug 1202762",
"url": "https://bugzilla.suse.com/1202762"
},
{
"category": "self",
"summary": "SUSE Bug 1202763",
"url": "https://bugzilla.suse.com/1202763"
},
{
"category": "self",
"summary": "SUSE Bug 1202764",
"url": "https://bugzilla.suse.com/1202764"
},
{
"category": "self",
"summary": "SUSE Bug 1202765",
"url": "https://bugzilla.suse.com/1202765"
},
{
"category": "self",
"summary": "SUSE Bug 1202766",
"url": "https://bugzilla.suse.com/1202766"
},
{
"category": "self",
"summary": "SUSE Bug 1202767",
"url": "https://bugzilla.suse.com/1202767"
},
{
"category": "self",
"summary": "SUSE Bug 1202768",
"url": "https://bugzilla.suse.com/1202768"
},
{
"category": "self",
"summary": "SUSE Bug 1202769",
"url": "https://bugzilla.suse.com/1202769"
},
{
"category": "self",
"summary": "SUSE Bug 1202770",
"url": "https://bugzilla.suse.com/1202770"
},
{
"category": "self",
"summary": "SUSE Bug 1202771",
"url": "https://bugzilla.suse.com/1202771"
},
{
"category": "self",
"summary": "SUSE Bug 1202773",
"url": "https://bugzilla.suse.com/1202773"
},
{
"category": "self",
"summary": "SUSE Bug 1202774",
"url": "https://bugzilla.suse.com/1202774"
},
{
"category": "self",
"summary": "SUSE Bug 1202775",
"url": "https://bugzilla.suse.com/1202775"
},
{
"category": "self",
"summary": "SUSE Bug 1202776",
"url": "https://bugzilla.suse.com/1202776"
},
{
"category": "self",
"summary": "SUSE Bug 1202778",
"url": "https://bugzilla.suse.com/1202778"
},
{
"category": "self",
"summary": "SUSE Bug 1202779",
"url": "https://bugzilla.suse.com/1202779"
},
{
"category": "self",
"summary": "SUSE Bug 1202780",
"url": "https://bugzilla.suse.com/1202780"
},
{
"category": "self",
"summary": "SUSE Bug 1202781",
"url": "https://bugzilla.suse.com/1202781"
},
{
"category": "self",
"summary": "SUSE Bug 1202782",
"url": "https://bugzilla.suse.com/1202782"
},
{
"category": "self",
"summary": "SUSE Bug 1202783",
"url": "https://bugzilla.suse.com/1202783"
},
{
"category": "self",
"summary": "SUSE Bug 1202822",
"url": "https://bugzilla.suse.com/1202822"
},
{
"category": "self",
"summary": "SUSE Bug 1202823",
"url": "https://bugzilla.suse.com/1202823"
},
{
"category": "self",
"summary": "SUSE Bug 1202824",
"url": "https://bugzilla.suse.com/1202824"
},
{
"category": "self",
"summary": "SUSE Bug 1202860",
"url": "https://bugzilla.suse.com/1202860"
},
{
"category": "self",
"summary": "SUSE Bug 1202867",
"url": "https://bugzilla.suse.com/1202867"
},
{
"category": "self",
"summary": "SUSE Bug 1202872",
"url": "https://bugzilla.suse.com/1202872"
},
{
"category": "self",
"summary": "SUSE Bug 1202874",
"url": "https://bugzilla.suse.com/1202874"
},
{
"category": "self",
"summary": "SUSE Bug 1202898",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "self",
"summary": "SUSE Bug 1202914",
"url": "https://bugzilla.suse.com/1202914"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1202989",
"url": "https://bugzilla.suse.com/1202989"
},
{
"category": "self",
"summary": "SUSE Bug 1202992",
"url": "https://bugzilla.suse.com/1202992"
},
{
"category": "self",
"summary": "SUSE Bug 1202993",
"url": "https://bugzilla.suse.com/1202993"
},
{
"category": "self",
"summary": "SUSE Bug 1203002",
"url": "https://bugzilla.suse.com/1203002"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203036",
"url": "https://bugzilla.suse.com/1203036"
},
{
"category": "self",
"summary": "SUSE Bug 1203039",
"url": "https://bugzilla.suse.com/1203039"
},
{
"category": "self",
"summary": "SUSE Bug 1203041",
"url": "https://bugzilla.suse.com/1203041"
},
{
"category": "self",
"summary": "SUSE Bug 1203063",
"url": "https://bugzilla.suse.com/1203063"
},
{
"category": "self",
"summary": "SUSE Bug 1203066",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "self",
"summary": "SUSE Bug 1203067",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "self",
"summary": "SUSE Bug 1203098",
"url": "https://bugzilla.suse.com/1203098"
},
{
"category": "self",
"summary": "SUSE Bug 1203101",
"url": "https://bugzilla.suse.com/1203101"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE Bug 1203116",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "self",
"summary": "SUSE Bug 1203117",
"url": "https://bugzilla.suse.com/1203117"
},
{
"category": "self",
"summary": "SUSE Bug 1203138",
"url": "https://bugzilla.suse.com/1203138"
},
{
"category": "self",
"summary": "SUSE Bug 1203139",
"url": "https://bugzilla.suse.com/1203139"
},
{
"category": "self",
"summary": "SUSE Bug 1203159",
"url": "https://bugzilla.suse.com/1203159"
},
{
"category": "self",
"summary": "SUSE Bug 1203183",
"url": "https://bugzilla.suse.com/1203183"
},
{
"category": "self",
"summary": "SUSE Bug 1203197",
"url": "https://bugzilla.suse.com/1203197"
},
{
"category": "self",
"summary": "SUSE Bug 1203208",
"url": "https://bugzilla.suse.com/1203208"
},
{
"category": "self",
"summary": "SUSE Bug 1203229",
"url": "https://bugzilla.suse.com/1203229"
},
{
"category": "self",
"summary": "SUSE Bug 1203263",
"url": "https://bugzilla.suse.com/1203263"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203338",
"url": "https://bugzilla.suse.com/1203338"
},
{
"category": "self",
"summary": "SUSE Bug 1203360",
"url": "https://bugzilla.suse.com/1203360"
},
{
"category": "self",
"summary": "SUSE Bug 1203361",
"url": "https://bugzilla.suse.com/1203361"
},
{
"category": "self",
"summary": "SUSE Bug 1203389",
"url": "https://bugzilla.suse.com/1203389"
},
{
"category": "self",
"summary": "SUSE Bug 1203391",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203435",
"url": "https://bugzilla.suse.com/1203435"
},
{
"category": "self",
"summary": "SUSE Bug 1203505",
"url": "https://bugzilla.suse.com/1203505"
},
{
"category": "self",
"summary": "SUSE Bug 1203511",
"url": "https://bugzilla.suse.com/1203511"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1203664",
"url": "https://bugzilla.suse.com/1203664"
},
{
"category": "self",
"summary": "SUSE Bug 1203693",
"url": "https://bugzilla.suse.com/1203693"
},
{
"category": "self",
"summary": "SUSE Bug 1203699",
"url": "https://bugzilla.suse.com/1203699"
},
{
"category": "self",
"summary": "SUSE Bug 1203767",
"url": "https://bugzilla.suse.com/1203767"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203770",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "self",
"summary": "SUSE Bug 1203794",
"url": "https://bugzilla.suse.com/1203794"
},
{
"category": "self",
"summary": "SUSE Bug 1203798",
"url": "https://bugzilla.suse.com/1203798"
},
{
"category": "self",
"summary": "SUSE Bug 1203802",
"url": "https://bugzilla.suse.com/1203802"
},
{
"category": "self",
"summary": "SUSE Bug 1203829",
"url": "https://bugzilla.suse.com/1203829"
},
{
"category": "self",
"summary": "SUSE Bug 1203893",
"url": "https://bugzilla.suse.com/1203893"
},
{
"category": "self",
"summary": "SUSE Bug 1203902",
"url": "https://bugzilla.suse.com/1203902"
},
{
"category": "self",
"summary": "SUSE Bug 1203906",
"url": "https://bugzilla.suse.com/1203906"
},
{
"category": "self",
"summary": "SUSE Bug 1203908",
"url": "https://bugzilla.suse.com/1203908"
},
{
"category": "self",
"summary": "SUSE Bug 1203922",
"url": "https://bugzilla.suse.com/1203922"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203939",
"url": "https://bugzilla.suse.com/1203939"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1203969",
"url": "https://bugzilla.suse.com/1203969"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1203992",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "self",
"summary": "SUSE Bug 1203994",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204051",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "self",
"summary": "SUSE Bug 1204059",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "self",
"summary": "SUSE Bug 1204060",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "self",
"summary": "SUSE Bug 1204092",
"url": "https://bugzilla.suse.com/1204092"
},
{
"category": "self",
"summary": "SUSE Bug 1204125",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "self",
"summary": "SUSE Bug 1204132",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "self",
"summary": "SUSE Bug 1204142",
"url": "https://bugzilla.suse.com/1204142"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE Bug 1204168",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "self",
"summary": "SUSE Bug 1204170",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "self",
"summary": "SUSE Bug 1204171",
"url": "https://bugzilla.suse.com/1204171"
},
{
"category": "self",
"summary": "SUSE Bug 1204183",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "self",
"summary": "SUSE Bug 1204228",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "self",
"summary": "SUSE Bug 1204241",
"url": "https://bugzilla.suse.com/1204241"
},
{
"category": "self",
"summary": "SUSE Bug 1204289",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "self",
"summary": "SUSE Bug 1204290",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "self",
"summary": "SUSE Bug 1204291",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "self",
"summary": "SUSE Bug 1204292",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "self",
"summary": "SUSE Bug 1204353",
"url": "https://bugzilla.suse.com/1204353"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204355",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "self",
"summary": "SUSE Bug 1204402",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "self",
"summary": "SUSE Bug 1204405",
"url": "https://bugzilla.suse.com/1204405"
},
{
"category": "self",
"summary": "SUSE Bug 1204413",
"url": "https://bugzilla.suse.com/1204413"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204415",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "self",
"summary": "SUSE Bug 1204417",
"url": "https://bugzilla.suse.com/1204417"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204428",
"url": "https://bugzilla.suse.com/1204428"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204432",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204470",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "self",
"summary": "SUSE Bug 1204479",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204498",
"url": "https://bugzilla.suse.com/1204498"
},
{
"category": "self",
"summary": "SUSE Bug 1204533",
"url": "https://bugzilla.suse.com/1204533"
},
{
"category": "self",
"summary": "SUSE Bug 1204569",
"url": "https://bugzilla.suse.com/1204569"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204575",
"url": "https://bugzilla.suse.com/1204575"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204619",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204635",
"url": "https://bugzilla.suse.com/1204635"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204637",
"url": "https://bugzilla.suse.com/1204637"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204650",
"url": "https://bugzilla.suse.com/1204650"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204693",
"url": "https://bugzilla.suse.com/1204693"
},
{
"category": "self",
"summary": "SUSE Bug 1204705",
"url": "https://bugzilla.suse.com/1204705"
},
{
"category": "self",
"summary": "SUSE Bug 1204719",
"url": "https://bugzilla.suse.com/1204719"
},
{
"category": "self",
"summary": "SUSE Bug 1204728",
"url": "https://bugzilla.suse.com/1204728"
},
{
"category": "self",
"summary": "SUSE Bug 1204745",
"url": "https://bugzilla.suse.com/1204745"
},
{
"category": "self",
"summary": "SUSE Bug 1204753",
"url": "https://bugzilla.suse.com/1204753"
},
{
"category": "self",
"summary": "SUSE Bug 1204780",
"url": "https://bugzilla.suse.com/1204780"
},
{
"category": "self",
"summary": "SUSE Bug 1204810",
"url": "https://bugzilla.suse.com/1204810"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1204926",
"url": "https://bugzilla.suse.com/1204926"
},
{
"category": "self",
"summary": "SUSE Bug 1204933",
"url": "https://bugzilla.suse.com/1204933"
},
{
"category": "self",
"summary": "SUSE Bug 1204934",
"url": "https://bugzilla.suse.com/1204934"
},
{
"category": "self",
"summary": "SUSE Bug 1204947",
"url": "https://bugzilla.suse.com/1204947"
},
{
"category": "self",
"summary": "SUSE Bug 1204957",
"url": "https://bugzilla.suse.com/1204957"
},
{
"category": "self",
"summary": "SUSE Bug 1204963",
"url": "https://bugzilla.suse.com/1204963"
},
{
"category": "self",
"summary": "SUSE Bug 1204970",
"url": "https://bugzilla.suse.com/1204970"
},
{
"category": "self",
"summary": "SUSE Bug 1205007",
"url": "https://bugzilla.suse.com/1205007"
},
{
"category": "self",
"summary": "SUSE Bug 1205100",
"url": "https://bugzilla.suse.com/1205100"
},
{
"category": "self",
"summary": "SUSE Bug 1205111",
"url": "https://bugzilla.suse.com/1205111"
},
{
"category": "self",
"summary": "SUSE Bug 1205113",
"url": "https://bugzilla.suse.com/1205113"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205149",
"url": "https://bugzilla.suse.com/1205149"
},
{
"category": "self",
"summary": "SUSE Bug 1205153",
"url": "https://bugzilla.suse.com/1205153"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205257",
"url": "https://bugzilla.suse.com/1205257"
},
{
"category": "self",
"summary": "SUSE Bug 1205264",
"url": "https://bugzilla.suse.com/1205264"
},
{
"category": "self",
"summary": "SUSE Bug 1205282",
"url": "https://bugzilla.suse.com/1205282"
},
{
"category": "self",
"summary": "SUSE Bug 1205313",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "self",
"summary": "SUSE Bug 1205331",
"url": "https://bugzilla.suse.com/1205331"
},
{
"category": "self",
"summary": "SUSE Bug 1205332",
"url": "https://bugzilla.suse.com/1205332"
},
{
"category": "self",
"summary": "SUSE Bug 1205427",
"url": "https://bugzilla.suse.com/1205427"
},
{
"category": "self",
"summary": "SUSE Bug 1205428",
"url": "https://bugzilla.suse.com/1205428"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205496",
"url": "https://bugzilla.suse.com/1205496"
},
{
"category": "self",
"summary": "SUSE Bug 1205507",
"url": "https://bugzilla.suse.com/1205507"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205521",
"url": "https://bugzilla.suse.com/1205521"
},
{
"category": "self",
"summary": "SUSE Bug 1205567",
"url": "https://bugzilla.suse.com/1205567"
},
{
"category": "self",
"summary": "SUSE Bug 1205616",
"url": "https://bugzilla.suse.com/1205616"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205653",
"url": "https://bugzilla.suse.com/1205653"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205679",
"url": "https://bugzilla.suse.com/1205679"
},
{
"category": "self",
"summary": "SUSE Bug 1205683",
"url": "https://bugzilla.suse.com/1205683"
},
{
"category": "self",
"summary": "SUSE Bug 1205700",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205711",
"url": "https://bugzilla.suse.com/1205711"
},
{
"category": "self",
"summary": "SUSE Bug 1205744",
"url": "https://bugzilla.suse.com/1205744"
},
{
"category": "self",
"summary": "SUSE Bug 1205764",
"url": "https://bugzilla.suse.com/1205764"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1205882",
"url": "https://bugzilla.suse.com/1205882"
},
{
"category": "self",
"summary": "SUSE Bug 1205993",
"url": "https://bugzilla.suse.com/1205993"
},
{
"category": "self",
"summary": "SUSE Bug 1206035",
"url": "https://bugzilla.suse.com/1206035"
},
{
"category": "self",
"summary": "SUSE Bug 1206036",
"url": "https://bugzilla.suse.com/1206036"
},
{
"category": "self",
"summary": "SUSE Bug 1206037",
"url": "https://bugzilla.suse.com/1206037"
},
{
"category": "self",
"summary": "SUSE Bug 1206045",
"url": "https://bugzilla.suse.com/1206045"
},
{
"category": "self",
"summary": "SUSE Bug 1206046",
"url": "https://bugzilla.suse.com/1206046"
},
{
"category": "self",
"summary": "SUSE Bug 1206047",
"url": "https://bugzilla.suse.com/1206047"
},
{
"category": "self",
"summary": "SUSE Bug 1206048",
"url": "https://bugzilla.suse.com/1206048"
},
{
"category": "self",
"summary": "SUSE Bug 1206049",
"url": "https://bugzilla.suse.com/1206049"
},
{
"category": "self",
"summary": "SUSE Bug 1206050",
"url": "https://bugzilla.suse.com/1206050"
},
{
"category": "self",
"summary": "SUSE Bug 1206051",
"url": "https://bugzilla.suse.com/1206051"
},
{
"category": "self",
"summary": "SUSE Bug 1206056",
"url": "https://bugzilla.suse.com/1206056"
},
{
"category": "self",
"summary": "SUSE Bug 1206057",
"url": "https://bugzilla.suse.com/1206057"
},
{
"category": "self",
"summary": "SUSE Bug 1206113",
"url": "https://bugzilla.suse.com/1206113"
},
{
"category": "self",
"summary": "SUSE Bug 1206114",
"url": "https://bugzilla.suse.com/1206114"
},
{
"category": "self",
"summary": "SUSE Bug 1206147",
"url": "https://bugzilla.suse.com/1206147"
},
{
"category": "self",
"summary": "SUSE Bug 1206149",
"url": "https://bugzilla.suse.com/1206149"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE Bug 1206273",
"url": "https://bugzilla.suse.com/1206273"
},
{
"category": "self",
"summary": "SUSE Bug 1206391",
"url": "https://bugzilla.suse.com/1206391"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3695 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16119 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36516 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33135 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4037 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1184 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1263 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1882 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20369 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2153 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26373 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2639 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28356 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2873 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2905 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2959 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2959/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2977 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2978 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3028 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3078 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3114 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3176 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3202 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32250 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32296 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3435 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3521 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3526 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3535 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3566 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3619 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3625 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3633 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3633/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36879 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36946 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3707 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39189 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39190 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40476 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40476/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42328 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42329 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42721 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45869 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45888 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-23T10:39:17Z",
"generator": {
"date": "2022-12-23T10:39:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4617-1",
"initial_release_date": "2022-12-23T10:39:17Z",
"revision_history": [
{
"date": "2022-12-23T10:39:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"product": {
"name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"product_id": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"product": {
"name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"product_id": "kernel-source-rt-5.14.21-150400.15.5.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP4",
"product": {
"name": "SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch"
},
"product_reference": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch"
},
"product_reference": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch"
},
"product_reference": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch"
},
"product_reference": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3695"
}
],
"notes": [
{
"category": "general",
"text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3695",
"url": "https://www.suse.com/security/cve/CVE-2016-3695"
},
{
"category": "external",
"summary": "SUSE Bug 1023051 for CVE-2016-3695",
"url": "https://bugzilla.suse.com/1023051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2016-3695"
},
{
"cve": "CVE-2020-16119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16119"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16119",
"url": "https://www.suse.com/security/cve/CVE-2020-16119"
},
{
"category": "external",
"summary": "SUSE Bug 1177471 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "external",
"summary": "SUSE Bug 1177742 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2020-16119"
},
{
"cve": "CVE-2020-36516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36516"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36516",
"url": "https://www.suse.com/security/cve/CVE-2020-36516"
},
{
"category": "external",
"summary": "SUSE Bug 1196616 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "external",
"summary": "SUSE Bug 1196867 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196867"
},
{
"category": "external",
"summary": "SUSE Bug 1204092 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204092"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2021-33135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33135"
}
],
"notes": [
{
"category": "general",
"text": "Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33135",
"url": "https://www.suse.com/security/cve/CVE-2021-33135"
},
{
"category": "external",
"summary": "SUSE Bug 1199515 for CVE-2021-33135",
"url": "https://bugzilla.suse.com/1199515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-33135"
},
{
"cve": "CVE-2021-4037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4037"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4037",
"url": "https://www.suse.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2021-4037",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2022-1184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1184"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1184",
"url": "https://www.suse.com/security/cve/CVE-2022-1184"
},
{
"category": "external",
"summary": "SUSE Bug 1198577 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "external",
"summary": "SUSE Bug 1210859 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1210859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1263"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1263",
"url": "https://www.suse.com/security/cve/CVE-2022-1263"
},
{
"category": "external",
"summary": "SUSE Bug 1198189 for CVE-2022-1263",
"url": "https://bugzilla.suse.com/1198189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-1263"
},
{
"cve": "CVE-2022-1882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1882"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1882",
"url": "https://www.suse.com/security/cve/CVE-2022-1882"
},
{
"category": "external",
"summary": "SUSE Bug 1199904 for CVE-2022-1882",
"url": "https://bugzilla.suse.com/1199904"
},
{
"category": "external",
"summary": "SUSE Bug 1200058 for CVE-2022-1882",
"url": "https://bugzilla.suse.com/1200058"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-20368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20368"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20368",
"url": "https://www.suse.com/security/cve/CVE-2022-20368"
},
{
"category": "external",
"summary": "SUSE Bug 1202346 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "external",
"summary": "SUSE Bug 1212311 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1212311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20369"
}
],
"notes": [
{
"category": "general",
"text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20369",
"url": "https://www.suse.com/security/cve/CVE-2022-20369"
},
{
"category": "external",
"summary": "SUSE Bug 1202347 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "external",
"summary": "SUSE Bug 1212321 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1212321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2153"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2153",
"url": "https://www.suse.com/security/cve/CVE-2022-2153"
},
{
"category": "external",
"summary": "SUSE Bug 1200788 for CVE-2022-2153",
"url": "https://bugzilla.suse.com/1200788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-2586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2586"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2586",
"url": "https://www.suse.com/security/cve/CVE-2022-2586"
},
{
"category": "external",
"summary": "SUSE Bug 1202095 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "external",
"summary": "SUSE Bug 1209719 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1209719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2588"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2588",
"url": "https://www.suse.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1203613 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1203613"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-26373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26373"
}
],
"notes": [
{
"category": "general",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26373",
"url": "https://www.suse.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "SUSE Bug 1201726 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "external",
"summary": "SUSE Bug 1209619 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1209619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2639"
}
],
"notes": [
{
"category": "general",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2639",
"url": "https://www.suse.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "SUSE Bug 1202154 for CVE-2022-2639",
"url": "https://bugzilla.suse.com/1202154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-28356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28356"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28356",
"url": "https://www.suse.com/security/cve/CVE-2022-28356"
},
{
"category": "external",
"summary": "SUSE Bug 1197391 for CVE-2022-28356",
"url": "https://bugzilla.suse.com/1197391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-28356"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2873"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u0027s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2873",
"url": "https://www.suse.com/security/cve/CVE-2022-2873"
},
{
"category": "external",
"summary": "SUSE Bug 1202558 for CVE-2022-2873",
"url": "https://bugzilla.suse.com/1202558"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2873"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2905"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2905",
"url": "https://www.suse.com/security/cve/CVE-2022-2905"
},
{
"category": "external",
"summary": "SUSE Bug 1202860 for CVE-2022-2905",
"url": "https://bugzilla.suse.com/1202860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2938"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2938",
"url": "https://www.suse.com/security/cve/CVE-2022-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1202623 for CVE-2022-2938",
"url": "https://bugzilla.suse.com/1202623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2938"
},
{
"cve": "CVE-2022-2959",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2959"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2959",
"url": "https://www.suse.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "SUSE Bug 1202681 for CVE-2022-2959",
"url": "https://bugzilla.suse.com/1202681"
},
{
"category": "external",
"summary": "SUSE Bug 1202685 for CVE-2022-2959",
"url": "https://bugzilla.suse.com/1202685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2977"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2977",
"url": "https://www.suse.com/security/cve/CVE-2022-2977"
},
{
"category": "external",
"summary": "SUSE Bug 1202672 for CVE-2022-2977",
"url": "https://bugzilla.suse.com/1202672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-2978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2978"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2978",
"url": "https://www.suse.com/security/cve/CVE-2022-2978"
},
{
"category": "external",
"summary": "SUSE Bug 1202700 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "external",
"summary": "SUSE Bug 1204745 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1204745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-3028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3028"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3028",
"url": "https://www.suse.com/security/cve/CVE-2022-3028"
},
{
"category": "external",
"summary": "SUSE Bug 1202898 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "external",
"summary": "SUSE Bug 1212296 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1212296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3078"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3078",
"url": "https://www.suse.com/security/cve/CVE-2022-3078"
},
{
"category": "external",
"summary": "SUSE Bug 1203041 for CVE-2022-3078",
"url": "https://bugzilla.suse.com/1203041"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-3078"
},
{
"cve": "CVE-2022-3114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3114"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3114",
"url": "https://www.suse.com/security/cve/CVE-2022-3114"
},
{
"category": "external",
"summary": "SUSE Bug 1206391 for CVE-2022-3114",
"url": "https://bugzilla.suse.com/1206391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3114"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3176"
}
],
"notes": [
{
"category": "general",
"text": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn\u0027t handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3176",
"url": "https://www.suse.com/security/cve/CVE-2022-3176"
},
{
"category": "external",
"summary": "SUSE Bug 1203391 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "external",
"summary": "SUSE Bug 1203511 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3176"
},
{
"cve": "CVE-2022-3202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3202"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3202",
"url": "https://www.suse.com/security/cve/CVE-2022-3202"
},
{
"category": "external",
"summary": "SUSE Bug 1203389 for CVE-2022-3202",
"url": "https://bugzilla.suse.com/1203389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3202"
},
{
"cve": "CVE-2022-32250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32250"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32250",
"url": "https://www.suse.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1202992 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1202992"
},
{
"category": "external",
"summary": "SUSE Bug 1202993 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1202993"
},
{
"category": "external",
"summary": "SUSE Bug 1203002 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1203002"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-32296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32296"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32296",
"url": "https://www.suse.com/security/cve/CVE-2022-32296"
},
{
"category": "external",
"summary": "SUSE Bug 1200288 for CVE-2022-32296",
"url": "https://bugzilla.suse.com/1200288"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-3435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3435"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3435",
"url": "https://www.suse.com/security/cve/CVE-2022-3435"
},
{
"category": "external",
"summary": "SUSE Bug 1204171 for CVE-2022-3435",
"url": "https://bugzilla.suse.com/1204171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3521"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3521",
"url": "https://www.suse.com/security/cve/CVE-2022-3521"
},
{
"category": "external",
"summary": "SUSE Bug 1204355 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3526"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3526",
"url": "https://www.suse.com/security/cve/CVE-2022-3526"
},
{
"category": "external",
"summary": "SUSE Bug 1204353 for CVE-2022-3526",
"url": "https://bugzilla.suse.com/1204353"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3526"
},
{
"cve": "CVE-2022-3535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3535"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3535",
"url": "https://www.suse.com/security/cve/CVE-2022-3535"
},
{
"category": "external",
"summary": "SUSE Bug 1204417 for CVE-2022-3535",
"url": "https://bugzilla.suse.com/1204417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-3535"
},
{
"cve": "CVE-2022-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3542",
"url": "https://www.suse.com/security/cve/CVE-2022-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1204402 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3566"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3566",
"url": "https://www.suse.com/security/cve/CVE-2022-3566"
},
{
"category": "external",
"summary": "SUSE Bug 1204405 for CVE-2022-3566",
"url": "https://bugzilla.suse.com/1204405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3594"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3594",
"url": "https://www.suse.com/security/cve/CVE-2022-3594"
},
{
"category": "external",
"summary": "SUSE Bug 1204479 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3619"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3619",
"url": "https://www.suse.com/security/cve/CVE-2022-3619"
},
{
"category": "external",
"summary": "SUSE Bug 1204569 for CVE-2022-3619",
"url": "https://bugzilla.suse.com/1204569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3619"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3625"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3625",
"url": "https://www.suse.com/security/cve/CVE-2022-3625"
},
{
"category": "external",
"summary": "SUSE Bug 1204637 for CVE-2022-3625",
"url": "https://bugzilla.suse.com/1204637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3629"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3629",
"url": "https://www.suse.com/security/cve/CVE-2022-3629"
},
{
"category": "external",
"summary": "SUSE Bug 1204635 for CVE-2022-3629",
"url": "https://bugzilla.suse.com/1204635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3633"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3633",
"url": "https://www.suse.com/security/cve/CVE-2022-3633"
},
{
"category": "external",
"summary": "SUSE Bug 1204650 for CVE-2022-3633",
"url": "https://bugzilla.suse.com/1204650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-3643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3643"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3643",
"url": "https://www.suse.com/security/cve/CVE-2022-3643"
},
{
"category": "external",
"summary": "SUSE Bug 1206113 for CVE-2022-3643",
"url": "https://bugzilla.suse.com/1206113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36879"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36879",
"url": "https://www.suse.com/security/cve/CVE-2022-36879"
},
{
"category": "external",
"summary": "SUSE Bug 1201948 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "external",
"summary": "SUSE Bug 1212327 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1212327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36946"
}
],
"notes": [
{
"category": "general",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36946",
"url": "https://www.suse.com/security/cve/CVE-2022-36946"
},
{
"category": "external",
"summary": "SUSE Bug 1201940 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1201940"
},
{
"category": "external",
"summary": "SUSE Bug 1201941 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1201941"
},
{
"category": "external",
"summary": "SUSE Bug 1202312 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1202312"
},
{
"category": "external",
"summary": "SUSE Bug 1202874 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1202874"
},
{
"category": "external",
"summary": "SUSE Bug 1203208 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1203208"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1212310 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1212310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3707"
}
],
"notes": [
{
"category": "general",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3707",
"url": "https://www.suse.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "SUSE Bug 1204780 for CVE-2022-3707",
"url": "https://bugzilla.suse.com/1204780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39189"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39189",
"url": "https://www.suse.com/security/cve/CVE-2022-39189"
},
{
"category": "external",
"summary": "SUSE Bug 1203066 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "external",
"summary": "SUSE Bug 1203067 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-39190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39190"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39190",
"url": "https://www.suse.com/security/cve/CVE-2022-39190"
},
{
"category": "external",
"summary": "SUSE Bug 1203117 for CVE-2022-39190",
"url": "https://bugzilla.suse.com/1203117"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-40476",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40476"
}
],
"notes": [
{
"category": "general",
"text": "A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40476",
"url": "https://www.suse.com/security/cve/CVE-2022-40476"
},
{
"category": "external",
"summary": "SUSE Bug 1203435 for CVE-2022-40476",
"url": "https://bugzilla.suse.com/1203435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-40476"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4129"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4129",
"url": "https://www.suse.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "SUSE Bug 1205711 for CVE-2022-4129",
"url": "https://bugzilla.suse.com/1205711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41674",
"url": "https://www.suse.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "SUSE Bug 1203770 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "external",
"summary": "SUSE Bug 1203994 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41849"
}
],
"notes": [
{
"category": "general",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41849",
"url": "https://www.suse.com/security/cve/CVE-2022-41849"
},
{
"category": "external",
"summary": "SUSE Bug 1203992 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42328"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42328",
"url": "https://www.suse.com/security/cve/CVE-2022-42328"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42328",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42329"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42329",
"url": "https://www.suse.com/security/cve/CVE-2022-42329"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42329",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42703"
}
],
"notes": [
{
"category": "general",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42703",
"url": "https://www.suse.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "SUSE Bug 1204168 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "external",
"summary": "SUSE Bug 1204170 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "external",
"summary": "SUSE Bug 1206463 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1206463"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42719"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42719",
"url": "https://www.suse.com/security/cve/CVE-2022-42719"
},
{
"category": "external",
"summary": "SUSE Bug 1204051 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "external",
"summary": "SUSE Bug 1204292 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42720"
}
],
"notes": [
{
"category": "general",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42720",
"url": "https://www.suse.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "SUSE Bug 1204059 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "external",
"summary": "SUSE Bug 1204291 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42721"
}
],
"notes": [
{
"category": "general",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42721",
"url": "https://www.suse.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "SUSE Bug 1204060 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "external",
"summary": "SUSE Bug 1204290 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42722",
"url": "https://www.suse.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "SUSE Bug 1204125 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "external",
"summary": "SUSE Bug 1204289 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45869"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45869",
"url": "https://www.suse.com/security/cve/CVE-2022-45869"
},
{
"category": "external",
"summary": "SUSE Bug 1205882 for CVE-2022-45869",
"url": "https://bugzilla.suse.com/1205882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-45869"
},
{
"cve": "CVE-2022-45888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45888"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45888",
"url": "https://www.suse.com/security/cve/CVE-2022-45888"
},
{
"category": "external",
"summary": "SUSE Bug 1205764 for CVE-2022-45888",
"url": "https://bugzilla.suse.com/1205764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-45888"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4515-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150200_24_134 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4515,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4515",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4515-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4515-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224515-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4515-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2022-12-16T21:06:03Z",
"generator": {
"date": "2022-12-16T21:06:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4515-1",
"initial_release_date": "2022-12-16T21:06:03Z",
"revision_history": [
{
"date": "2022-12-16T21:06:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_134-preempt-3-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_134-preempt-3-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_134-preempt-3-150200.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:03Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:03Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-3-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:03Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4545-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP5)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-122_133 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4545,SUSE-SLE-Live-Patching-12-SP5-2022-4545",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4545-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4545-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224545-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4545-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP5)",
"tracking": {
"current_release_date": "2022-12-18T00:05:33Z",
"generator": {
"date": "2022-12-18T00:05:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4545-1",
"initial_release_date": "2022-12-18T00:05:33Z",
"revision_history": [
{
"date": "2022-12-18T00:05:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4550-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 26 for SLE 15)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150_78 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4550,SUSE-SLE-Live-Patching-12-SP4-2022-4549,SUSE-SLE-Live-Patching-12-SP4-2022-4550,SUSE-SLE-Live-Patching-12-SP5-2022-4557,SUSE-SLE-Module-Live-Patching-15-2022-4552,SUSE-SLE-Module-Live-Patching-15-2022-4558,SUSE-SLE-Module-Live-Patching-15-2022-4575",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4550-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4550-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224550-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4550-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 26 for SLE 15)",
"tracking": {
"current_release_date": "2022-12-19T17:05:39Z",
"generator": {
"date": "2022-12-19T17:05:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4550-1",
"initial_release_date": "2022-12-19T17:05:39Z",
"revision_history": [
{
"date": "2022-12-19T17:05:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4577-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 31 for SLE 15)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150000_150_95 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4577,SUSE-SLE-Live-Patching-12-SP4-2022-4548,SUSE-SLE-Live-Patching-12-SP5-2022-4578,SUSE-SLE-Module-Live-Patching-15-2022-4553,SUSE-SLE-Module-Live-Patching-15-2022-4554,SUSE-SLE-Module-Live-Patching-15-2022-4576,SUSE-SLE-Module-Live-Patching-15-2022-4577",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4577-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4577-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224577-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4577-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 31 for SLE 15)",
"tracking": {
"current_release_date": "2022-12-19T19:05:42Z",
"generator": {
"date": "2022-12-19T19:05:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4577-1",
"initial_release_date": "2022-12-19T19:05:42Z",
"revision_history": [
{
"date": "2022-12-19T19:05:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2023:2162-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 AZURE kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2483: Fixed a use after free bug in emac_remove due caused by a race condition (bsc#1211037).\n- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).\n- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).\n- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).\n- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).\n- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).\n\nThe following non-security bugs were fixed:\n\n- USB: dwc3: fix runtime pm imbalance on probe errors (git-fixes).\n- USB: dwc3: fix runtime pm imbalance on unbind (git-fixes).\n- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath10k: Fix the parsing error in service available event (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).\n- audit: improve audit queue handling when \u0027audit=1\u0027 on cmdline (bsc#1209969).\n- bpf, x86: Fix encoding for lower 8-bit registers in BPF_STX BPF_B (git-fixes).\n- cachefiles: Drop superfluous readpages aops NULL check (bsc#1210430).\n- cachefiles: Fix page leak in cachefiles_read_backing_file while vmscan is active (bsc#1210430).\n- cachefiles: Fix race between read_waiter and read_copier involving op-\u003eto_do (bsc#1210430).\n- cachefiles: Handle readpage error correctly (bsc#1210430).\n- cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827).\n- cifs: fix negotiate context parsing (bsc#1210301).\n- cifs: fix open leaks in open_cached_dir() (bsc#1209342).\n- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).\n- crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).\n- drivers: net: lmc: fix case value for target abort error (git-fixes).\n- fscache, cachefiles: remove redundant variable \u0027cache\u0027 (bsc#1210430).\n- ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).\n- intel_pmc_ipc: restore ability to call functions with irq enabled (git-fixes).\n- ipmi: fix SSIF not responding under certain cond (git-fixes).\n- iwlwifi: Fix -EIO error code that is never returned (git-fixes).\n- iwlwifi: fw: make pos static in iwl_sar_get_ewrd_table() loop (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).\n- kabi/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777).\n- kcm: Only allow TCP sockets to be attached to a KCM mux (git-fixes).\n- keys: Change keyring_serialise_link_sem to a mutex (bsc#1207088).\n- keys: Fix linking a duplicate key to a keyring\u0027s assoc_array (bsc#1207088).\n- keys: Hoist locking out of __key_link_begin() (bsc#1207088).\n- kretprobe: Prevent triggering kretprobe from within kprobe_flush_task (git-fixes).\n- l2tp: clean up stale tunnel or session in pppol2tp_connect\u0027s error path (git-fixes).\n- l2tp: fix pseudo-wire type for sessions created by pppol2tp_connect() (git-fixes).\n- l2tp: reject creation of non-PPP sessions on L2TPv2 tunnels (git-fixes).\n- net/ncsi: Do not return error on normal response (git-fixes).\n- net: axienet: Fix double deregister of mdio (git-fixes).\n- net: core: dst: Add kernel-doc for \u0027net\u0027 parameter (git-fixes).\n- net: core: dst_cache_set_ip6: Rename \u0027addr\u0027 parameter to \u0027saddr\u0027 for consistency (git-fixes).\n- net: phy: realtek: Use the dummy stubs for MMD register access for rtl8211b (git-fixes).\n- net: prevent ISA drivers from building on PPC32 (git-fixes).\n- net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).\n- netfilter: nft_set_rbtree: fix parameter of __nft_rbtree_lookup() (git-fixes).\n- netfilter: x_tables: Add note about how to free percpu counters (git-fixes).\n- ntp: Limit TAI-UTC offset (git-fixes)\n- nvme-pci: do not WARN_ON in nvme_reset_work if ctrl.state is not RESETTING (git-fixes).\n- nvme-pci: fix doorbell buffer value endianness (git-fixes).\n- nvme: retain split access workaround for capability reads (git-fixes).\n- platform/x86: intel_pmc_ipc: Use devm_* calls in driver probe function (git-fixes).\n- platform/x86: intel_pmc_ipc: Use spin_lock to protect GCR updates (git-fixes).\n- powercap: fix possible name leak in powercap_register_zone() (git-fixes).\n- powerpc/numa: Consider the max NUMA node for migratable LPAR (bsc#1209999 ltc#202140 bsc#1190544 ltc#194520 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/numa: Detect support for coregroup (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/numa: Limit possible nodes to within num_possible_nodes (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/numa: Restrict possible nodes based on platform (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- printk: Give error on attempt to set log buffer length to over 2G (bsc#1210534).\n- ring-buffer: Fix race while reader and writer are on the same page (git-fixes).\n- rpm/kernel-obs-build.spec.in: Remove SLE11 cruft\n- s390/percpu: add READ_ONCE() to arch_this_cpu_to_op_simple() (git-fixes).\n- scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).\n- scsi: qla2xxx: Perform lockless command completion in abort path (git-fixes).\n- sctp: do not free asoc when it is already dead in sctp_sendmsg (git-fixes).\n- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (git-fixes).\n- sctp: use the right sk after waking up from wait_buf sleep (git-fixes).\n- struct ci_hdrc: hide new member at end (git-fixes).\n- struct wmi_svc_avail_ev_arg: new member to end (git-fixes).\n- timekeeping: Prevent 32bit truncation in (git-fixes)\n- tuntap: fix dividing by zero in ebpf queue selection (git-fixes).\n- uprobes/x86: Fix detection of 32-bit user mode (git-fixes).\n- usb/ohci-platform: Fix a warning when hibernating (git-fixes).\n- usb: chipidea: core: fix possible concurrent when switch role (git-fixes).\n- usb: chipidea: fix missing goto in `ci_hdrc_probe` (git-fixes).\n- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).\n- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).\n- usb: host: ohci-pxa27x: Fix and \u0026 vs | typo (git-fixes).\n- usb: storage: Add check for kcalloc (git-fixes).\n- usb: typec: Check for ops-\u003eexit instead of ops-\u003eenter in altmode_exit (git-fixes).\n- watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).\n- wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git-fixes).\n- workqueue: Fix missing kfree(rescuer) in destroy_workqueue() (bsc#1210460).\n- workqueue: Fix spurious sanity check failures in destroy_workqueue() (bsc#1210460).\n- wq: handle VM suspension in stall detection (bsc#1210466).\n- x86, boot: Remove multiple copy of static function sanitize_boot_params() (git-fixes).\n- x86/apic: Fix arch_dynirq_lower_bound() bug for DT enabled machines (git-fixes).\n- x86/apic: Handle missing global clockevent gracefully (git-fixes bsc#1142926).\n- x86/apic: Soft disable APIC before initializing it (git-fixes).\n- x86/boot/compressed: Disable relocation relaxation (git-fixes).\n- x86/boot: Avoid using Intel mnemonics in AT\u0026T syntax asm (git-fixes).\n- x86/bugs: Add Cannon lake to RETBleed affected CPU list (git-fixes).\n- x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).\n- x86/decoder: Add TEST opcode to Group3-2 (git-fixes).\n- x86/fpu: Prevent FPU state corruption (git-fixes).\n- x86/ioapic: Prevent inconsistent state when moving an interrupt (git-fixes).\n- x86/irq: Ensure PI wakeup handler is unregistered before module unload (git-fixes).\n- x86/kprobes: Fix to check non boostable prefixes correctly (git-fixes).\n- x86/kprobes: Restore BTF if the single-stepping is cancelled (git-fixes).\n- x86/lib/cpu: Address missing prototypes warning (git-fixes).\n- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).\n- x86/mce: Lower throttling MCE messages\u0027 priority to warning (git-fixes).\n- x86/mm: Stop printing BRK addresses (git-fixes).\n- x86/mm: Use the correct function type for native_set_fixmap() (git-fixes).\n- x86/pkeys: Add check for pkey \u0027overflow\u0027 (git-fixes).\n- x86/reboot: Always use NMI fallback when shutdown via reboot vector IPI fails (git-fixes).\n- x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inline (git-fixes).\n- x86/sysfb: Fix check for bad VRAM size (git-fixes).\n- x86/tools/relocs: Fix non-POSIX regexp (git-fixes).\n- x86/tools: Fix objdump version check again (git-fixes).\n- x86/virt: Eat faults on VMXOFF in reboot flows (git-fixes).\n- x86/virt: Mark flags and memory as clobbered by VMXOFF (git-fixes).\n- x86: Do not let pgprot_modify() change the page encryption bit (git-fixes).\n- x86_64: Fix jiffies ODR violation (git-fixes).\n- xfrm: policy: use hlist rcu variants on insert (git-fixes).\n- xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git-fixes).\n- xhci: hide include of iommu.h (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2162,SUSE-SLE-SERVER-12-SP5-2023-2162",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2162-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2162-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232162-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2162-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html"
},
{
"category": "self",
"summary": "SUSE Bug 1142685",
"url": "https://bugzilla.suse.com/1142685"
},
{
"category": "self",
"summary": "SUSE Bug 1142926",
"url": "https://bugzilla.suse.com/1142926"
},
{
"category": "self",
"summary": "SUSE Bug 1174777",
"url": "https://bugzilla.suse.com/1174777"
},
{
"category": "self",
"summary": "SUSE Bug 1190544",
"url": "https://bugzilla.suse.com/1190544"
},
{
"category": "self",
"summary": "SUSE Bug 1202353",
"url": "https://bugzilla.suse.com/1202353"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1207088",
"url": "https://bugzilla.suse.com/1207088"
},
{
"category": "self",
"summary": "SUSE Bug 1209342",
"url": "https://bugzilla.suse.com/1209342"
},
{
"category": "self",
"summary": "SUSE Bug 1209687",
"url": "https://bugzilla.suse.com/1209687"
},
{
"category": "self",
"summary": "SUSE Bug 1209777",
"url": "https://bugzilla.suse.com/1209777"
},
{
"category": "self",
"summary": "SUSE Bug 1209871",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "self",
"summary": "SUSE Bug 1209887",
"url": "https://bugzilla.suse.com/1209887"
},
{
"category": "self",
"summary": "SUSE Bug 1209969",
"url": "https://bugzilla.suse.com/1209969"
},
{
"category": "self",
"summary": "SUSE Bug 1209999",
"url": "https://bugzilla.suse.com/1209999"
},
{
"category": "self",
"summary": "SUSE Bug 1210202",
"url": "https://bugzilla.suse.com/1210202"
},
{
"category": "self",
"summary": "SUSE Bug 1210301",
"url": "https://bugzilla.suse.com/1210301"
},
{
"category": "self",
"summary": "SUSE Bug 1210329",
"url": "https://bugzilla.suse.com/1210329"
},
{
"category": "self",
"summary": "SUSE Bug 1210336",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "self",
"summary": "SUSE Bug 1210337",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "self",
"summary": "SUSE Bug 1210430",
"url": "https://bugzilla.suse.com/1210430"
},
{
"category": "self",
"summary": "SUSE Bug 1210460",
"url": "https://bugzilla.suse.com/1210460"
},
{
"category": "self",
"summary": "SUSE Bug 1210466",
"url": "https://bugzilla.suse.com/1210466"
},
{
"category": "self",
"summary": "SUSE Bug 1210469",
"url": "https://bugzilla.suse.com/1210469"
},
{
"category": "self",
"summary": "SUSE Bug 1210498",
"url": "https://bugzilla.suse.com/1210498"
},
{
"category": "self",
"summary": "SUSE Bug 1210506",
"url": "https://bugzilla.suse.com/1210506"
},
{
"category": "self",
"summary": "SUSE Bug 1210534",
"url": "https://bugzilla.suse.com/1210534"
},
{
"category": "self",
"summary": "SUSE Bug 1210647",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "self",
"summary": "SUSE Bug 1210827",
"url": "https://bugzilla.suse.com/1210827"
},
{
"category": "self",
"summary": "SUSE Bug 1211037",
"url": "https://bugzilla.suse.com/1211037"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36691 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1611 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1670 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1855 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1989 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1990 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1998 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2162 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2483 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-30772 page",
"url": "https://www.suse.com/security/cve/CVE-2023-30772/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-05-10T16:07:03Z",
"generator": {
"date": "2023-05-10T16:07:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2162-1",
"initial_release_date": "2023-05-10T16:07:03Z",
"revision_history": [
{
"date": "2023-05-10T16:07:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.133.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.133.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.133.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.133.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.133.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.133.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.133.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.133.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.133.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.133.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.133.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.133.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.133.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.133.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.133.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.133.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.133.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.133.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.133.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.133.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.133.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.133.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.133.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.133.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.133.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.133.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.133.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.133.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.133.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.133.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.133.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.133.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.133.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.133.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.133.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.133.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.133.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.133.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.133.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36691"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36691",
"url": "https://www.suse.com/security/cve/CVE-2020-36691"
},
{
"category": "external",
"summary": "SUSE Bug 1209613 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209613"
},
{
"category": "external",
"summary": "SUSE Bug 1209777 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2023-1611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1611"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1611",
"url": "https://www.suse.com/security/cve/CVE-2023-1611"
},
{
"category": "external",
"summary": "SUSE Bug 1209687 for CVE-2023-1611",
"url": "https://bugzilla.suse.com/1209687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1670"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1670",
"url": "https://www.suse.com/security/cve/CVE-2023-1670"
},
{
"category": "external",
"summary": "SUSE Bug 1209871 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1855"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1855",
"url": "https://www.suse.com/security/cve/CVE-2023-1855"
},
{
"category": "external",
"summary": "SUSE Bug 1210202 for CVE-2023-1855",
"url": "https://bugzilla.suse.com/1210202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1989"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1989",
"url": "https://www.suse.com/security/cve/CVE-2023-1989"
},
{
"category": "external",
"summary": "SUSE Bug 1210336 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "external",
"summary": "SUSE Bug 1210500 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210500"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "important"
}
],
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1990"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1990",
"url": "https://www.suse.com/security/cve/CVE-2023-1990"
},
{
"category": "external",
"summary": "SUSE Bug 1210337 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "external",
"summary": "SUSE Bug 1210501 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210501"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1998"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1998",
"url": "https://www.suse.com/security/cve/CVE-2023-1998"
},
{
"category": "external",
"summary": "SUSE Bug 1210506 for CVE-2023-1998",
"url": "https://bugzilla.suse.com/1210506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2124"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2124",
"url": "https://www.suse.com/security/cve/CVE-2023-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1210498 for CVE-2023-2124",
"url": "https://bugzilla.suse.com/1210498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2162"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2162",
"url": "https://www.suse.com/security/cve/CVE-2023-2162"
},
{
"category": "external",
"summary": "SUSE Bug 1210647 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "external",
"summary": "SUSE Bug 1210662 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210662"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2483"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2483",
"url": "https://www.suse.com/security/cve/CVE-2023-2483"
},
{
"category": "external",
"summary": "SUSE Bug 1211037 for CVE-2023-2483",
"url": "https://bugzilla.suse.com/1211037"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-30772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-30772"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-30772",
"url": "https://www.suse.com/security/cve/CVE-2023-30772"
},
{
"category": "external",
"summary": "SUSE Bug 1210329 for CVE-2023-30772",
"url": "https://bugzilla.suse.com/1210329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.133.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.133.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.133.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T16:07:03Z",
"details": "moderate"
}
],
"title": "CVE-2023-30772"
}
]
}
suse-su-2022:4544-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_90 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3640: Fixed a use-after-free in l2cap_conn_del of the file net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4544,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4544",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4544-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4544-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224544-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4544-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-17T23:34:15Z",
"generator": {
"date": "2022-12-17T23:34:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4544-1",
"initial_release_date": "2022-12-17T23:34:15Z",
"revision_history": [
{
"date": "2022-12-17T23:34:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_90-preempt-6-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_90-preempt-6-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_90-preempt-6-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2023:2151-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).\n- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).\n- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).\n- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).\n- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).\n\nThe following non-security bugs were fixed:\n\n- cifs: fix negotiate context parsing (bsc#1210301).\n- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2151,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2151,SUSE-SLE-Product-HA-15-SP1-2023-2151,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2151,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2151,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2151,openSUSE-SLE-15.4-2023-2151",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2151-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2151-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2151-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html"
},
{
"category": "self",
"summary": "SUSE Bug 1202353",
"url": "https://bugzilla.suse.com/1202353"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1209613",
"url": "https://bugzilla.suse.com/1209613"
},
{
"category": "self",
"summary": "SUSE Bug 1209687",
"url": "https://bugzilla.suse.com/1209687"
},
{
"category": "self",
"summary": "SUSE Bug 1209777",
"url": "https://bugzilla.suse.com/1209777"
},
{
"category": "self",
"summary": "SUSE Bug 1209871",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "self",
"summary": "SUSE Bug 1209887",
"url": "https://bugzilla.suse.com/1209887"
},
{
"category": "self",
"summary": "SUSE Bug 1210202",
"url": "https://bugzilla.suse.com/1210202"
},
{
"category": "self",
"summary": "SUSE Bug 1210301",
"url": "https://bugzilla.suse.com/1210301"
},
{
"category": "self",
"summary": "SUSE Bug 1210329",
"url": "https://bugzilla.suse.com/1210329"
},
{
"category": "self",
"summary": "SUSE Bug 1210336",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "self",
"summary": "SUSE Bug 1210337",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "self",
"summary": "SUSE Bug 1210469",
"url": "https://bugzilla.suse.com/1210469"
},
{
"category": "self",
"summary": "SUSE Bug 1210498",
"url": "https://bugzilla.suse.com/1210498"
},
{
"category": "self",
"summary": "SUSE Bug 1210506",
"url": "https://bugzilla.suse.com/1210506"
},
{
"category": "self",
"summary": "SUSE Bug 1210647",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36691 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1611 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1670 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1855 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1989 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1990 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1998 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2162 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-30772 page",
"url": "https://www.suse.com/security/cve/CVE-2023-30772/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-05-09T15:35:27Z",
"generator": {
"date": "2023-05-09T15:35:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2151-1",
"initial_release_date": "2023-05-09T15:35:27Z",
"revision_history": [
{
"date": "2023-05-09T15:35:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-default-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-syms-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150100.197.145.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150100.197.145.1.noarch",
"product_id": "kernel-devel-4.12.14-150100.197.145.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150100.197.145.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150100.197.145.1.noarch",
"product_id": "kernel-docs-4.12.14-150100.197.145.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150100.197.145.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150100.197.145.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150100.197.145.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150100.197.145.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150100.197.145.1.noarch",
"product_id": "kernel-macros-4.12.14-150100.197.145.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150100.197.145.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150100.197.145.1.noarch",
"product_id": "kernel-source-4.12.14-150100.197.145.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150100.197.145.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150100.197.145.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150100.197.145.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-default-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-default-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-default-base-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-default-man-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-syms-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.145.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-debug-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-default-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-syms-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.145.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.145.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.145.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.145.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.145.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.145.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.145.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.145.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.145.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36691"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36691",
"url": "https://www.suse.com/security/cve/CVE-2020-36691"
},
{
"category": "external",
"summary": "SUSE Bug 1209613 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209613"
},
{
"category": "external",
"summary": "SUSE Bug 1209777 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "moderate"
}
],
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2023-1611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1611"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1611",
"url": "https://www.suse.com/security/cve/CVE-2023-1611"
},
{
"category": "external",
"summary": "SUSE Bug 1209687 for CVE-2023-1611",
"url": "https://bugzilla.suse.com/1209687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1670"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1670",
"url": "https://www.suse.com/security/cve/CVE-2023-1670"
},
{
"category": "external",
"summary": "SUSE Bug 1209871 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1855"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1855",
"url": "https://www.suse.com/security/cve/CVE-2023-1855"
},
{
"category": "external",
"summary": "SUSE Bug 1210202 for CVE-2023-1855",
"url": "https://bugzilla.suse.com/1210202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1989"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1989",
"url": "https://www.suse.com/security/cve/CVE-2023-1989"
},
{
"category": "external",
"summary": "SUSE Bug 1210336 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "external",
"summary": "SUSE Bug 1210500 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210500"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "important"
}
],
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1990"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1990",
"url": "https://www.suse.com/security/cve/CVE-2023-1990"
},
{
"category": "external",
"summary": "SUSE Bug 1210337 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "external",
"summary": "SUSE Bug 1210501 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210501"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1998"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1998",
"url": "https://www.suse.com/security/cve/CVE-2023-1998"
},
{
"category": "external",
"summary": "SUSE Bug 1210506 for CVE-2023-1998",
"url": "https://bugzilla.suse.com/1210506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2124"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2124",
"url": "https://www.suse.com/security/cve/CVE-2023-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1210498 for CVE-2023-2124",
"url": "https://bugzilla.suse.com/1210498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2162"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2162",
"url": "https://www.suse.com/security/cve/CVE-2023-2162"
},
{
"category": "external",
"summary": "SUSE Bug 1210647 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "external",
"summary": "SUSE Bug 1210662 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210662"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-30772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-30772"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-30772",
"url": "https://www.suse.com/security/cve/CVE-2023-30772"
},
{
"category": "external",
"summary": "SUSE Bug 1210329 for CVE-2023-30772",
"url": "https://bugzilla.suse.com/1210329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:35:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-30772"
}
]
}
suse-su-2022:4543-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_87 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4543,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4543",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4543-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4543-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224543-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4543-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-17T23:34:04Z",
"generator": {
"date": "2022-12-17T23:34:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4543-1",
"initial_release_date": "2022-12-17T23:34:04Z",
"revision_history": [
{
"date": "2022-12-17T23:34:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-preempt-7-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-preempt-7-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-preempt-7-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4587-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-24_107 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4587,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4582,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4587,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4588",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4587-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4587-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224587-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4587-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2022-12-20T12:34:02Z",
"generator": {
"date": "2022-12-20T12:34:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4587-1",
"initial_release_date": "2022-12-20T12:34:02Z",
"revision_history": [
{
"date": "2022-12-20T12:34:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_99-preempt-17-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_99-preempt-17-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_99-preempt-17-150200.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4528-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_60 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4528,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4528,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4532",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4528-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4528-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224528-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4528-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-17T17:34:13Z",
"generator": {
"date": "2022-12-17T17:34:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4528-1",
"initial_release_date": "2022-12-17T17:34:13Z",
"revision_history": [
{
"date": "2022-12-17T17:34:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_49-preempt-16-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_49-preempt-16-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_49-preempt-16-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4613-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).\n- ALSA: hda: fix potential memleak in \u0027add_widget_node\u0027 (git-fixes).\n- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).\n- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).\n- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).\n- ASoC: codecs: jz4725b: Fix spelling mistake \u0027Sourc\u0027 -\u003e \u0027Source\u0027, \u0027Routee\u0027 -\u003e \u0027Route\u0027 (git-fixes).\n- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).\n- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).\n- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).\n- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).\n- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).\n- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).\n- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).\n- ASoC: wm5102: Revert \u0027ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe\u0027 (git-fixes).\n- ASoC: wm5110: Revert \u0027ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe\u0027 (git-fixes).\n- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).\n- ASoC: wm8997: Revert \u0027ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe\u0027 (git-fixes).\n- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).\n- Do not enable CONFIG_ATARI_PARTITION (jsc#PED-1573)\n- Drivers: hv: vmbus: Add /sys/bus/vmbus/hibernation (git-fixes).\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017).\n- Drivers: hv: vmbus: Drop error message when \u0027No request id available\u0027 (bsc#1204017).\n- Drivers: hv: vmbus: Fix duplicate CPU assignments within a device (git-fixes).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).\n- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).\n- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).\n- Drivers: hv: vmbus: Remove unused linux/version.h header (git-fixes).\n- Drivers: hv: vmbus: Replace smp_store_mb() with virt_store_mb() (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: remove unused function (git-fixes).\n- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).\n- Input: i8042 - fix leaking of platform device on module removal (git-fixes).\n- Input: iforce - invert valid length check when fetching device IDs (git-fixes).\n- KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support (git-fixes).\n- KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1 (git-fixes).\n- KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT) (git-fixes).\n- KVM: nVMX: clear PIN_BASED_POSTED_INTR from nested pinbased_ctls only when apicv is globally disabled (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes).\n- KVM: s390: Fix handle_sske page fault handling (git-fixes).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes).\n- KVM: s390: get rid of register asm usage (git-fixes).\n- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).\n- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).\n- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).\n- KVM: s390: reduce number of IO pins to 1 (git-fixes).\n- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).\n- NFS: Refactor nfs_instantiate() for dentry referencing callers (bsc#1204215).\n- NFSv3: use nfs_add_or_obtain() to create and reference inodes (bsc#1204215).\n- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).\n- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).\n- PCI: hv: Drop msi_controller structure (bsc#1204446).\n- PCI: hv: Fix a race condition when removing the device (bsc#1204446).\n- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).\n- PCI: hv: Fix typo (bsc#1204446).\n- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).\n- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).\n- PCI: hv: Support for create interrupt v3 (bsc#1204446).\n- PCI: hv: Use PCI_ERROR_RESPONSE to identify config read errors (bsc#1204446).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- RDMA/core/sa_query: Remove unused argument (git-fixes)\n- RDMA/hns: Fix spelling mistakes of original (git-fixes)\n- RDMA/qedr: Add support for user mode XRC-SRQ\u0027s (git-fixes)\n- RDMA/qedr: Fix reporting max_{send/recv}_wr attrs (git-fixes)\n- RDMA/qedr: Remove unsupported qedr_resize_cq callback (git-fixes)\n- RDMA/rxe: Fix memory leak in error path code (git-fixes)\n- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).\n- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID.\n- Xen/gntdev: do not ignore kernel unmapping error (git-fixes).\n- add another bug reference to some hyperv changes (bsc#1205617).\n- arm/xen: Do not probe xenbus as part of an early initcall (git-fixes).\n- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes)\n- arm64: dts: juno: Add thermal critical trip points (git-fixes)\n- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes)\n- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).\n- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).\n- blk-crypto: fix check for too-large dun_bytes (git-fixes).\n- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).\n- blk-mq: do not create hctx debugfs dir until q-\u003edebugfs_dir is created (git-fixes).\n- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern (git-fixes).\n- block: Add a helper to validate the block size (git-fixes).\n- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1204328).\n- block: ataflop: fix breakage introduced at blk-mq refactoring (git-fixes).\n- block: ataflop: more blk-mq refactoring fixes (git-fixes).\n- block: fix infinite loop for invalid zone append (git-fixes).\n- block: limit request dispatch loop duration (git-fixes).\n- block: nbd: add sanity check for first_minor (git-fixes).\n- block: use \u0027unsigned long\u0027 for blk_validate_block_size() (git-fixes).\n- bus: sunxi-rsb: Support atomic transfers (git-fixes).\n- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).\n- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).\n- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1205989).\n- ceph: do not access the kiocb after aio requests (bsc#1205984).\n- ceph: fix fscache invalidation (bsc#1205985).\n- ceph: lockdep annotations for try_nonblocking_invalidate (bsc#1205988).\n- ceph: remove bogus checks and WARN_ONs from ceph_set_page_dirty (bsc#1205986).\n- ceph: request Fw caps before updating the mtime in ceph_write_iter (bsc#1205987).\n- cifs: skip extra NULL byte in filenames (bsc#1204791).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm integrity: set journal entry unused when shrinking device (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm raid: fix address sanitizer warning in raid_resume (git-fixes).\n- dm raid: fix address sanitizer warning in raid_status (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm verity fec: fix misaligned RS roots IO (git-fixes).\n- dm writecache: fix writing beyond end of underlying device when shrinking (git-fixes).\n- dm writecache: return the exact table values that were set (git-fixes).\n- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).\n- dm: fix request-based DM to not bounce through indirect dm_submit_bio (git-fixes).\n- dm: remove special-casing of bio-based immutable singleton target on NVMe (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).\n- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).\n- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).\n- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).\n- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).\n- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).\n- dmaengine: at_hdmac: Fix impossible condition (git-fixes).\n- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).\n- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).\n- drivers/hv: remove obsolete TODO and fix misleading typo in comment (git-fixes).\n- drivers: hv: Fix EXPORT_SYMBOL and tab spaces issue (git-fixes).\n- drivers: hv: Fix hyperv_record_panic_msg path on comment (git-fixes).\n- drivers: hv: Fix missing error code in vmbus_connect() (git-fixes).\n- drivers: hv: vmbus: Fix call msleep using \u0026lt; 20ms (git-fixes).\n- drivers: hv: vmbus: Fix checkpatch LINE_SPACING (git-fixes).\n- drivers: hv: vmbus: Fix checkpatch SPLIT_STRING (git-fixes).\n- drivers: hv: vmbus: Replace symbolic permissions by octal permissions (git-fixes).\n- drivers: net: slip: fix NPD bug in sl_tx_timeout() (git-fixes).\n- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).\n- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).\n- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).\n- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).\n- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).\n- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).\n- drm/rockchip: dsi: Force synchronous probe (git-fixes).\n- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).\n- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).\n- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).\n- firmware: arm_scmi: Suppress the driver\u0027s bind attributes (git-fixes).\n- ftrace: Fix char print issue in print_ip_ins() (git-fixes).\n- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).\n- fuse: add file_modified() to fallocate (bsc#1205330).\n- fuse: fix readdir cache race (bsc#1205329).\n- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).\n- hv: hyperv.h: Remove unused inline functions (git-fixes).\n- hv_netvsc: Add a comment clarifying batching logic (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_netvsc: Add error handling while switching data path (bsc#1204850).\n- hv_netvsc: Allocate the recv_buf buffers after NVSP_MSG1_TYPE_SEND_RECV_BUF (git-fixes).\n- hv_netvsc: Check VF datapath when sending traffic to VF (git-fixes).\n- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).\n- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).\n- hv_netvsc: Use bitmap_zalloc() when applicable (git-fixes).\n- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- hv_netvsc: Validate number of allocated sub-channels (git-fixes).\n- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).\n- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).\n- hv_utils: Fix passing zero to \u0027PTR_ERR\u0027 warning (git-fixes).\n- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).\n- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).\n- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).\n- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).\n- i2c: i801: add lis3lv02d\u0027s I2C address for Vostro 5568 (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).\n- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).\n- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).\n- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).\n- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).\n- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).\n- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).\n- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).\n- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).\n- iwlwifi: dbg: disable ini debug in 9000 family and below (git-fixes).\n- kABI: Fix after adding trace_iterator.wait_index (git-fixes).\n- kABI: remove new member of usbip_device (git-fixes).\n- kabi: fix transport_add_device change (git-fixes).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- kvm: nVMX: reflect MTF VM-exits if injected by L1 (git-fixes).\n- loop: Check for overflow while configuring loop (git-fixes).\n- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes).\n- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).\n- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).\n- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).\n- media: venus: dec: Handle the case where find_format fails (git-fixes).\n- media: vim2m: initialize the media device earlier (git-fixes).\n- media: vivid: fix assignment of dev-\u003efbuf_out_flags (git-fixes).\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).\n- mmc: core: properly select voltage range without power cycle (git-fixes).\n- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).\n- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).\n- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).\n- nbd: Fix use-after-free in pid_show (git-fixes).\n- nbd: fix possible overflow for \u0027first_minor\u0027 in nbd_dev_add() (git-fixes).\n- nbd: fix possible overflow on \u0027first_minor\u0027 in nbd_dev_add() (git-fixes).\n- nbd: handle device refs for DESTROY_ON_DISCONNECT properly (git-fixes).\n- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).\n- net: ethernet: nixge: fix NULL dereference (git-fixes).\n- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- net: phy: fix null-ptr-deref while probe() failed (git-fixes).\n- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).\n- net: usb: qmi_wwan: Set DTR quirk for MR400 (git-fixes).\n- net: usb: qmi_wwan: restore mtu min/max values after raw_ip switch (git-fixes).\n- nfc/nci: fix race with opening and closing (git-fixes).\n- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).\n- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).\n- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).\n- nfsd: set the server_scope during service startup (bsc#1203746).\n- null_blk: Fail zone append to conventional zones (git-fixes).\n- null_blk: synchronization fix for zoned device (git-fixes).\n- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- parport_pc: Avoid FIFO port location truncation (git-fixes).\n- phy: stm32: fix an error code in probe (git-fixes).\n- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).\n- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).\n- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).\n- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).\n- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).\n- printk: use atomic updates for klogd work (bsc#1204934).\n- printk: wake waiters for safe and NMI contexts (bsc#1204934).\n- r8152: Add MAC passthrough support to new device (git-fixes).\n- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).\n- r8152: use new helper tcp_v6_gso_csum_prep (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- regulator: core: fix UAF in destroy_regulator() (git-fixes).\n- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).\n- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).\n- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Allow splice to read previous partially read pages (git-fixes).\n- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).\n- ring-buffer: Fix race between reset page and reading page (git-fixes).\n- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).\n- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- rndis_host: increase sleep time in the query-response loop (git-fixes).\n- rtc: mt6397: fix alarm register overwrite (git-fixes).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- s390/cpcmd: fix inline assembly register clobbering (git-fixes).\n- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).\n- s390/disassembler: increase ebpf disasm buffer size (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205428 LTC#200501).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (bsc#1203144 LTC#199881).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (git-fixes).\n- s390/ptrace: return -ENOSYS when invalid syscall is supplied (git-fixes).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).\n- s390/vtime: fix inline assembly clobber list (git-fixes).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- s390/zcrypt: fix zcard and zqueue hot-unplug memleak (git-fixes).\n- s390: Remove arch_has_random, arch_has_random_seed (git-fixes).\n- s390: fix double free of GS and RI CBs on fork() failure (git-fixes).\n- s390: fix nospec table alignments (git-fixes).\n- s390: mark __cpacf_query() as __always_inline (git-fixes).\n- scsi: bsg: Remove support for SCSI_IOCTL_SEND_COMMAND (git-fixes).\n- scsi: drivers: base: Propagate errors through the transport component (git-fixes).\n- scsi: drivers: base: Support atomic version of attribute_container_device_trigger (git-fixes).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729 bsc#1204810 ltc#200162).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).\n- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).\n- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).\n- scsi: lpfc: Fix spelling mistake \u0027unsolicted\u0027 -\u003e \u0027unsolicited\u0027 (bsc#1204957).\n- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).\n- scsi: lpfc: Set sli4_param\u0027s cmf option to zero when CMF is turned off (bsc#1204957).\n- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).\n- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).\n- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).\n- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).\n- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).\n- scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).\n- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).\n- scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).\n- scsi: storvsc: Miscellaneous code cleanups (git-fixes).\n- scsi: storvsc: Parameterize number hardware queues (git-fixes).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).\n- scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).\n- scsi: storvsc: Update error logging (git-fixes).\n- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).\n- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).\n- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).\n- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).\n- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).\n- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).\n- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).\n- serial: imx: Add missing .thaw_noirq hook (git-fixes).\n- siox: fix possible memory leak in siox_device_add() (git-fixes).\n- slimbus: stream: correct presence rate frequencies (git-fixes).\n- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).\n- spi: stm32: Print summary \u0027callbacks suppressed\u0027 message (git-fixes).\n- staging: greybus: light: fix a couple double frees (git-fixes).\n- swiotlb-xen: use vmalloc_to_page on vmalloc virt addresses (git-fixes).\n- tracing/ring-buffer: Have polling block on watermark (git-fixes).\n- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).\n- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).\n- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).\n- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).\n- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).\n- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).\n- tracing: Wake up waiters when tracing is disabled (git-fixes).\n- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: fix PHY disable sequence (git-fixes).\n- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).\n- usb: dwc3: gadget: Fix null pointer exception (git-fixes).\n- usb: dwc3: qcom: fix runtime PM wakeup.\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).\n- usbip: add sysfs_lock to synchronize sysfs code paths (git-fixes).\n- usbip: stub-dev synchronize sysfs code paths (git-fixes).\n- usbip: stub_dev: remake locking for kABI (git-fixes).\n- usbip: synchronize event handler with sysfs code paths (git-fixes).\n- usbip: usbip_event: use global lock (git-fixes).\n- usbip: vudc synchronize sysfs code paths (git-fixes).\n- usbip: vudc_sysfs: use global lock (git-fixes).\n- use __netdev_notify_peers in hyperv (git-fixes).\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027 (bsc#1200845)\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- virtio_blk: eliminate anonymous module_init \u0026 module_exit (git-fixes).\n- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).\n- vmlinux.lds.h: Fix placement of \u0027.data..decrypted\u0027 section (git-fixes).\n- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).\n- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).\n- wifi: cfg80211: silence a sparse RCU warning (git-fixes).\n- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).\n- workqueue: do not skip lockdep work dependency in cancel_work_sync() (bsc#1204967).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- x86/hyperv: check cpu mask after interrupt has been disabled (git-fixes).\n- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/xen: Add xen_no_vector_callback option to test PCI INTX delivery (git-fixes).\n- x86/xen: Distribute switch variables for initialization (git-fixes).\n- x86/xen: do not unbind uninitialized lock_kicker_irq (git-fixes).\n- xen-blkback: prevent premature module unload (git-fixes).\n- xen-netback: correct success/error reporting for the SKB-with-fraglist case (git-fixes).\n- xen/balloon: fix balloon kthread freezing (git-fixes).\n- xen/balloon: fix ballooned page accounting without hotplug enabled (git-fixes).\n- xen/balloon: fix cancelled balloon action (git-fixes).\n- xen/balloon: use a kernel thread instead a workqueue (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/gntdev: Prevent leaking grants (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen/privcmd: Corrected error handling path (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/xenbus: Fix granting of vmalloc\u0027d memory (git-fixes).\n- xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status (git-fixes).\n- xen: Fix XenStore initialisation for XS_LOCAL (git-fixes).\n- xen: Fix event channel callback via INTX/GSI (git-fixes).\n- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu\u003e=32 (git-fixes).\n- xenbus: req-\u003ebody should be updated before req-\u003estate (git-fixes).\n- xenbus: req-\u003eerr should be updated before req-\u003estate (git-fixes).\n- xfs: Lower CIL flush limit for large logs (git-fixes).\n- xfs: Throttle commits on delayed background CIL push (git-fixes).\n- xfs: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- xfs: check owner of dir3 blocks (git-fixes).\n- xfs: factor common AIL item deletion code (git-fixes).\n- xfs: open code insert range extent split helper (git-fixes).\n- xfs: rework collapse range into an atomic operation (git-fixes).\n- xfs: rework insert range into an atomic operation (git-fixes).\n- xfs: tail updates only need to occur when LSN changes (git-fixes).\n- xfs: trylock underlying buffer on dquot flush (git-fixes).\n- xfs: xfs_buf_corruption_error should take __this_address (git-fixes).\n- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4613,SUSE-SLE-Module-RT-15-SP3-2022-4613,SUSE-SUSE-MicroOS-5.1-2022-4613,SUSE-SUSE-MicroOS-5.2-2022-4613,openSUSE-Leap-Micro-5.2-2022-4613,openSUSE-SLE-15.3-2022-4613",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4613-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4613-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224613-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4613-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1189297",
"url": "https://bugzilla.suse.com/1189297"
},
{
"category": "self",
"summary": "SUSE Bug 1192761",
"url": "https://bugzilla.suse.com/1192761"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1203144",
"url": "https://bugzilla.suse.com/1203144"
},
{
"category": "self",
"summary": "SUSE Bug 1203746",
"url": "https://bugzilla.suse.com/1203746"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204142",
"url": "https://bugzilla.suse.com/1204142"
},
{
"category": "self",
"summary": "SUSE Bug 1204215",
"url": "https://bugzilla.suse.com/1204215"
},
{
"category": "self",
"summary": "SUSE Bug 1204241",
"url": "https://bugzilla.suse.com/1204241"
},
{
"category": "self",
"summary": "SUSE Bug 1204328",
"url": "https://bugzilla.suse.com/1204328"
},
{
"category": "self",
"summary": "SUSE Bug 1204446",
"url": "https://bugzilla.suse.com/1204446"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204693",
"url": "https://bugzilla.suse.com/1204693"
},
{
"category": "self",
"summary": "SUSE Bug 1204780",
"url": "https://bugzilla.suse.com/1204780"
},
{
"category": "self",
"summary": "SUSE Bug 1204791",
"url": "https://bugzilla.suse.com/1204791"
},
{
"category": "self",
"summary": "SUSE Bug 1204810",
"url": "https://bugzilla.suse.com/1204810"
},
{
"category": "self",
"summary": "SUSE Bug 1204827",
"url": "https://bugzilla.suse.com/1204827"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1204934",
"url": "https://bugzilla.suse.com/1204934"
},
{
"category": "self",
"summary": "SUSE Bug 1204957",
"url": "https://bugzilla.suse.com/1204957"
},
{
"category": "self",
"summary": "SUSE Bug 1204963",
"url": "https://bugzilla.suse.com/1204963"
},
{
"category": "self",
"summary": "SUSE Bug 1204967",
"url": "https://bugzilla.suse.com/1204967"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205186",
"url": "https://bugzilla.suse.com/1205186"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205329",
"url": "https://bugzilla.suse.com/1205329"
},
{
"category": "self",
"summary": "SUSE Bug 1205330",
"url": "https://bugzilla.suse.com/1205330"
},
{
"category": "self",
"summary": "SUSE Bug 1205428",
"url": "https://bugzilla.suse.com/1205428"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205700",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205753",
"url": "https://bugzilla.suse.com/1205753"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1205984",
"url": "https://bugzilla.suse.com/1205984"
},
{
"category": "self",
"summary": "SUSE Bug 1205985",
"url": "https://bugzilla.suse.com/1205985"
},
{
"category": "self",
"summary": "SUSE Bug 1205986",
"url": "https://bugzilla.suse.com/1205986"
},
{
"category": "self",
"summary": "SUSE Bug 1205987",
"url": "https://bugzilla.suse.com/1205987"
},
{
"category": "self",
"summary": "SUSE Bug 1205988",
"url": "https://bugzilla.suse.com/1205988"
},
{
"category": "self",
"summary": "SUSE Bug 1205989",
"url": "https://bugzilla.suse.com/1205989"
},
{
"category": "self",
"summary": "SUSE Bug 1206032",
"url": "https://bugzilla.suse.com/1206032"
},
{
"category": "self",
"summary": "SUSE Bug 1206037",
"url": "https://bugzilla.suse.com/1206037"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3707 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-23T09:42:58Z",
"generator": {
"date": "2022-12-23T09:42:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4613-1",
"initial_release_date": "2022-12-23T09:42:58Z",
"revision_history": [
{
"date": "2022-12-23T09:42:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-150300.112.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-150300.112.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-150300.112.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-150300.112.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-150300.112.1.noarch",
"product_id": "kernel-source-rt-5.3.18-150300.112.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt-optional-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt-optional-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-optional-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-rt_debug-optional-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-rt_debug-optional-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-150300.112.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-150300.112.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-150300.112.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-150300.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.112.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.112.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP3",
"product": {
"name": "SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-150300.112.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-150300.112.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-150300.112.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-150300.112.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.112.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-150300.112.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-150300.112.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-150300.112.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-150300.112.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.112.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.112.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.112.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-150300.112.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-150300.112.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-150300.112.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-150300.112.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.112.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-150300.112.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-150300.112.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-150300.112.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-150300.112.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3707"
}
],
"notes": [
{
"category": "general",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3707",
"url": "https://www.suse.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "SUSE Bug 1204780 for CVE-2022-3707",
"url": "https://bugzilla.suse.com/1204780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4129"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4129",
"url": "https://www.suse.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "SUSE Bug 1205711 for CVE-2022-4129",
"url": "https://bugzilla.suse.com/1205711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-rt_debug-devel-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:kernel-source-rt-5.3.18-150300.112.1.noarch",
"openSUSE Leap 15.3:kernel-syms-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-rt-5.3.18-150300.112.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:42:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4611-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism (bsc#1177282).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bsc#1203322).\n- CVE-2022-41848: Fixed a race condition in drivers/char/pcmcia/synclink_cs.c mgslpc_ioctl and mgslpc_detach (bsc#1203987).\n\nThe following non-security bugs were fixed:\n\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- x86/hyperv: Set pv_info.name to \u0027Hyper-V\u0027 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4611,SUSE-SLE-SERVER-12-SP3-BCL-2022-4611",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4611-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4611-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224611-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4611-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html"
},
{
"category": "self",
"summary": "SUSE Bug 1129898",
"url": "https://bugzilla.suse.com/1129898"
},
{
"category": "self",
"summary": "SUSE Bug 1177282",
"url": "https://bugzilla.suse.com/1177282"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1198702",
"url": "https://bugzilla.suse.com/1198702"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202686",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203322",
"url": "https://bugzilla.suse.com/1203322"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE Bug 1204168",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "self",
"summary": "SUSE Bug 1204170",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204402",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204432",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204479",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204635",
"url": "https://bugzilla.suse.com/1204635"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1206164",
"url": "https://bugzilla.suse.com/1206164"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3874 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26541 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4037 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-23T08:35:56Z",
"generator": {
"date": "2022-12-23T08:35:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4611-1",
"initial_release_date": "2022-12-23T08:35:56Z",
"revision_history": [
{
"date": "2022-12-23T08:35:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.182.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.182.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.182.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.182.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.182.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.182.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.182.1.aarch64",
"product_id": "kernel-default-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.182.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.182.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.182.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.182.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.182.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.182.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.182.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.182.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.182.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.182.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.182.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.182.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.182.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.182.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.182.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.182.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.182.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.182.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.182.1.noarch",
"product_id": "kernel-devel-4.4.180-94.182.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.182.1.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.182.1.noarch",
"product_id": "kernel-docs-4.4.180-94.182.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.182.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.182.1.noarch",
"product_id": "kernel-docs-html-4.4.180-94.182.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.182.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.182.1.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.182.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.182.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.182.1.noarch",
"product_id": "kernel-macros-4.4.180-94.182.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.182.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.182.1.noarch",
"product_id": "kernel-source-4.4.180-94.182.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.182.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.182.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.182.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.182.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.182.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.182.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.182.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.182.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.182.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.182.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.182.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.182.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.182.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.182.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.182.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.182.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.182.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.182.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.182.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.182.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.182.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.182.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.182.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.182.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.182.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.182.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.182.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.182.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.182.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.182.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.182.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.182.1.s390x",
"product_id": "kernel-default-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.182.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.182.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.182.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.182.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.182.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.182.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.182.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.182.1.s390x",
"product_id": "kernel-syms-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.182.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.182.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.182.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.182.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.182.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.182.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.182.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.182.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.182.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.182.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.182.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.182.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.182.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.182.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.182.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.182.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.182.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.182.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.182.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.182.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.182.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.182.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.182.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.182.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.182.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.182.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.182.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.182.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.182.1.x86_64",
"product_id": "kernel-default-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.182.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.182.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.182.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.182.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.182.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.182.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.182.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.182.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.182.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.182.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.182.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.182.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.182.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.182.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.182.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.182.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.182.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.182.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.182.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.182.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.182.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.182.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.182.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.182.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.182.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.182.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.182.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.182.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.182.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.182.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.182.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.182.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.182.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.182.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.182.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3874"
}
],
"notes": [
{
"category": "general",
"text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3874",
"url": "https://www.suse.com/security/cve/CVE-2019-3874"
},
{
"category": "external",
"summary": "SUSE Bug 1129898 for CVE-2019-3874",
"url": "https://bugzilla.suse.com/1129898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2019-3874"
},
{
"cve": "CVE-2020-26541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26541"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26541",
"url": "https://www.suse.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "SUSE Bug 1177282 for CVE-2020-26541",
"url": "https://bugzilla.suse.com/1177282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2021-4037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4037"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4037",
"url": "https://www.suse.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2021-4037",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3542",
"url": "https://www.suse.com/security/cve/CVE-2022-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1204402 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3594"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3594",
"url": "https://www.suse.com/security/cve/CVE-2022-3594"
},
{
"category": "external",
"summary": "SUSE Bug 1204479 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3629"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3629",
"url": "https://www.suse.com/security/cve/CVE-2022-3629"
},
{
"category": "external",
"summary": "SUSE Bug 1204635 for CVE-2022-3629",
"url": "https://bugzilla.suse.com/1204635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "low"
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-40307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40307"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40307",
"url": "https://www.suse.com/security/cve/CVE-2022-40307"
},
{
"category": "external",
"summary": "SUSE Bug 1203322 for CVE-2022-40307",
"url": "https://bugzilla.suse.com/1203322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42703"
}
],
"notes": [
{
"category": "general",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42703",
"url": "https://www.suse.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "SUSE Bug 1204168 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "external",
"summary": "SUSE Bug 1204170 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "external",
"summary": "SUSE Bug 1206463 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1206463"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "important"
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.182.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.182.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.182.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T08:35:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4560-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.14.21-150400_24_28 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3640: Fixed a use-after-free in l2cap_conn_del of the file net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4560,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4560",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4560-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4560-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224560-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4560-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP4)",
"tracking": {
"current_release_date": "2022-12-19T12:06:27Z",
"generator": {
"date": "2022-12-19T12:06:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4560-1",
"initial_release_date": "2022-12-19T12:06:27Z",
"revision_history": [
{
"date": "2022-12-19T12:06:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:27Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:27Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:27Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:27Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:27Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-3-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:27Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4566-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Drop error message when \u0027No request id available\u0027 (bsc#1204017).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Move __vmbus_open() (bsc#1204017).\n- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- FDDI: defxx: Bail out gracefully with unassigned PCI resource for CSR (git-fixes).\n- FDDI: defxx: Make MMIO the configuration default except for EISA (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes).\n- KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).\n- KVM: s390: Fix handle_sske page fault handling (git-fixes).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes).\n- KVM: s390: fix memory slot handling for KVM_SET_USER_MEMORY_REGION (git-fixes).\n- KVM: s390: reduce number of IO pins to 1 (git-fixes).\n- KVM: s390: split kvm_s390_logical_to_effective (git-fixes).\n- KVM: s390: split kvm_s390_real_to_abs (git-fixes).\n- KVM: s390x: fix SCK locking (git-fixes).\n- NIU: fix incorrect error return, missed in previous revert (git-fixes).\n- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).\n- PCI: hv: Add validation for untrusted Hyper-V values (bsc#1204017).\n- PCI: hv: Drop msi_controller structure (bsc#1204446).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (bsc#1199365).\n- PCI: hv: Fix a race condition when removing the device (bsc#1204446).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017, bsc#1203860, bsc#1205617).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017, bsc#1205617).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).\n- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).\n- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: hv: Support for create interrupt v3 (git-fixes).\n- PCI: hv: Use struct_size() helper (bsc#1204446).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- PM: hibernate: fix sparse warnings (git-fixes).\n- Xen/gntdev: do not ignore kernel unmapping error (git-fixes).\n- add missing bug reference to a hv_netvsc patch file (bsc#1204850).\n- always clear the X2APIC_ENABLE bit for PV guest (git-fixes).\n- arm/xen: Do not probe xenbus as part of an early initcall (git-fixes).\n- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).\n- bfq: Update cgroup information before merging bio (git-fixes).\n- blk-mq: add callback of .cleanup_rq (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block/bfq: fix ifdef for CONFIG_BFQ_GROUP_IOSCHED=y (git-fixes).\n- block: Add a helper to validate the block size (git-fixes).\n- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).\n- block: do not delete queue kobject before its children (git-fixes).\n- block: respect queue limit of max discard segment (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- block: use \u0027unsigned long\u0027 for blk_validate_block_size() (git-fixes).\n- bnxt_en: Clean up completion ring page arrays completely (git-fixes).\n- bnxt_en: Do not use static arrays for completion ring pages (git-fixes).\n- bnxt_en: Fix Priority Bytes and Packets counters in ethtool -S (git-fixes).\n- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).\n- bnxt_en: Free context memory after disabling PCI in probe error path (git-fixes).\n- bnxt_en: Increase maximum RX ring size if jumbo ring is not used (git-fixes).\n- brd: re-enable __GFP_HIGHMEM in brd_insert_page() (git-fixes).\n- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).\n- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).\n- can: rcar_can: fix suspend/resume (git-fixes).\n- ceph: check availability of mds cluster on mount after wait timeout (bsc#1205903).\n- ceph: do not skip updating wanted caps when cap is stale (bsc#1205905).\n- ceph: fix fscache invalidation (bsc#1205907).\n- ceph: fix potential race in ceph_check_caps (bsc#1205906).\n- ceph: lockdep annotations for try_nonblocking_invalidate (bsc#1205908).\n- ceph: return -EINVAL if given fsc mount option on kernel w/o support (bsc#1205902).\n- ceph: return -ERANGE if virtual xattr value didn\u0027t fit in buffer (bsc#1205901).\n- ceph: return ceph_mdsc_do_request() errors from __get_parent() (bsc#1205904).\n- cuse: prevent clone (bsc#1206120).\n- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm mpath: remove harmful bio-based optimization (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm raid: fix address sanitizer warning in raid_resume (git-fixes).\n- dm raid: fix address sanitizer warning in raid_status (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- e100: fix buffer overrun in e100_get_regs (git-fixes).\n- e100: fix length calculation in e100_get_regs_len (git-fixes).\n- floppy: Fix hang in watchdog when disk is ejected (git-fixes).\n- ftrace: Fix char print issue in print_ip_ins() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- fuse: do not check refcount after stealing page (bsc#1206119).\n- fuse: retrieve: cap requested size to negotiated max_write (bsc#1206118).\n- fuse: use READ_ONCE on congestion_threshold and max_background (bsc#1206117).\n- gianfar: Disable EEE autoneg by default (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_netvsc: Add error handling while switching data path (bsc#1204850).\n- hv_netvsc: Add validation for untrusted Hyper-V values (bsc#1204017).\n- hv_netvsc: Cache the current data path to avoid duplicate call and message (bsc#1204017).\n- hv_netvsc: Check VF datapath when sending traffic to VF (bsc#1204017).\n- hv_netvsc: Fix error handling in netvsc_set_features() (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (git-fixes).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (bsc#1204017).\n- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).\n- hv_netvsc: Remove unnecessary round_up for recv_completion_cnt (bsc#1204017).\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (bsc#1204017).\n- hv_netvsc: Sync offloading features to VF NIC (git-fixes).\n- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).\n- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).\n- i40e: Fix kernel crash during module removal (git-fixes).\n- i40e: Fix reset path while removing the driver (git-fixes).\n- i40e: fix endless loop under rtnl (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- kprobes/x86/xen: blacklist non-attachable xen interrupt functions (git-fixes).\n- livepatch: Add a missing newline character in klp_module_coming() (bsc#1071995).\n- livepatch: fix race between fork and KLP transition (bsc#1071995).\n- macsec: check return value of skb_to_sgvec always (git-fixes).\n- macsec: fix memory leaks when skb_to_sgvec fails (git-fixes).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).\n- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mceusb: RX -EPIPE (urb status = -32) lockup failure fix (git-fixes).\n- media: mceusb: TX -EPIPE (urb status = -32) lockup fix (git-fixes).\n- media: mceusb: do not read data parameters unless required (git-fixes).\n- media: mceusb: fix inaccurate debug buffer dumps, and misleading debug messages (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: mceusb: sporadic RX truncation corruption fix (git-fixes).\n- mm, swap, frontswap: fix THP swap if frontswap enabled (git-fixes).\n- module: change to print useful messages from elf_validity_check() (git-fixes).\n- module: fix [e_shstrndx].sh_size=0 OOB access (git-fixes).\n- module: harden ELF info handling (git-fixes).\n- natsemi: sonic: stop calling netdev_boot_setup_check (git-fixes).\n- nbd: do not update block size after device is started (git-fixes).\n- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).\n- net/mlx5: Fix flow table chaining (git-fixes).\n- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).\n- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).\n- net: aquantia: Fix actual speed capabilities reporting (git-fixes).\n- net: bcmgenet: Ensure all TX/RX queues DMAs are disabled (git-fixes).\n- net: ethernet: arc: fix error handling in emac_rockchip_probe (git-fixes).\n- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).\n- net: ethernet: xilinx: Mark XILINX_LL_TEMAC broken on 64-bit (git-fixes).\n- net: hns3: add limit ets dwrr bandwidth cannot be 0 (git-fixes).\n- net: hns3: check vlan id before using it (git-fixes).\n- net: hns3: disable sriov before unload hclge layer (git-fixes).\n- net: hns3: do not allow call hns3_nic_net_open repeatedly (git-fixes).\n- net: hns3: fix change RSS \u0027hfunc\u0027 ineffective issue (git-fixes).\n- net: hns3: fix kernel crash when unload VF while it is being reset (git-fixes).\n- net: hns3: reset DWRR of unused tc to zero (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: ieee802154: adf7242: Fix bug if defined DEBUG (git-fixes).\n- net: ieee802154: at86rf230: Stop leaking skb\u0027s (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: mdiobus: Fix memory leak in __mdiobus_register (git-fixes).\n- net: moxa: fix UAF in moxart_mac_probe (git-fixes).\n- net: natsemi: Fix missing pci_disable_device() in probe and remove (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- net: nxp: lpc_eth.c: avoid hang when bringing interface down (git-fixes).\n- net: qcom/emac: fix UAF in emac_remove (git-fixes).\n- net: smsc911x: Fix unload crash when link is up (git-fixes).\n- net: ti: fix UAF in tlan_remove_one (git-fixes).\n- net: xen-netback: fix return type of ndo_start_xmit function (git-fixes).\n- nfsd: set the server_scope during service startup (bsc#1203746).\n- null_blk: Fix the null_add_dev() error path (git-fixes).\n- null_blk: fix ida error handling in null_add_dev() (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- phy: mdio: fix memory leak (git-fixes).\n- ptp: dp83640: do not define PAGE0 (git-fixes).\n- qed: Fix missing error code in qed_slowpath_start() (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Allow splice to read previous partially read pages (git-fixes).\n- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).\n- ring-buffer: Fix race between reset page and reading page (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- s390/cio: Fix the \u0027type\u0027 field in s390_cio_tpi tracepoint (git-fixes).\n- s390/cio: dont call css_wait_for_slow_path() inside a lock (git-fixes).\n- s390/cpcmd: fix inline assembly register clobbering (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).\n- s390/ctcm: fix potential memory leak (git-fixes).\n- s390/ctcm: fix variable dereferenced before check (git-fixes).\n- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (git-fixes).\n- s390/lcs: fix variable dereferenced before check (git-fixes).\n- s390/mcck: fix invalid KVM guest condition check (git-fixes).\n- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/module: fix loading modules with a lot of relocations (git-fixes).\n- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).\n- s390/nmi: handle vector validity failures for KVM guests (git-fixes).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (git-fixes).\n- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).\n- s390/pv: fix the forcing of the swiotlb (git-fixes).\n- s390/qdio: cancel the ESTABLISH ccw after timeout (git-fixes).\n- s390/qdio: fix roll-back after timeout on ESTABLISH ccw (git-fixes).\n- s390/qeth: Fix deadlock in remove_discipline (bsc#1206213 LTC#200742).\n- s390/qeth: Fix error handling during VNICC initialization (git-fixes).\n- s390/qeth: Fix initialization of vnicc cmd masks during set online (git-fixes).\n- s390/qeth: Fix vnicc_is_in_use if rx_bcast not set (git-fixes).\n- s390/qeth: do not defer close_dev work during recovery (bsc#1206213 LTC#200742).\n- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).\n- s390/qeth: fix deadlock during failing recovery (bsc#1206213 LTC#200742).\n- s390/qeth: fix false reporting of VNIC CHAR config failure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: remove driver-wide workqueue (bsc#1206213 LTC#200742).\n- s390/qeth: vnicc Fix EOPNOTSUPP precedence (git-fixes).\n- s390/qeth: vnicc Fix init to default (git-fixes).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (git-fixes).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- s390: Remove arch_has_random, arch_has_random_seed (git-fixes).\n- s390: appldata depends on PROC_SYSCTL (git-fixes).\n- s390: define get_cycles macro for arch-override (git-fixes).\n- s390: fix nospec table alignments (git-fixes).\n- sbitmap: fix possible io hung due to lost wakeup (git-fixes).\n- scsi: bsg: Remove support for SCSI_IOCTL_SEND_COMMAND (git-fixes).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (git-fixes).\n- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).\n- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).\n- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).\n- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).\n- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).\n- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- selftests/livepatch: better synchronize test_klp_callbacks_busy (bsc#1071995).\n- sfp: fix RX_LOS signal handling (git-fixes).\n- sis900: Fix missing pci_disable_device() in probe and remove (git-fixes).\n- sunrpc: Re-purpose trace_svc_process (bsc#1205006).\n- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).\n- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).\n- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).\n- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).\n- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).\n- tracing: Wake up waiters when tracing is disabled (git-fixes).\n- tulip: windbond-840: Fix missing pci_disable_device() in probe and remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio: ccw: fix error return in vfio_ccw_sch_event (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- virtio/s390: implement virtio-ccw revision 2 correctly (git-fixes).\n- virtio_blk: eliminate anonymous module_init \u0026 module_exit (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- x86/hyperv: Set pv_info.name to \u0027Hyper-V\u0027 (git-fixes).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/xen: Distribute switch variables for initialization (git-fixes).\n- x86/xen: Return from panic notifier (git-fixes).\n- x86/xen: do not unbind uninitialized lock_kicker_irq (git-fixes).\n- xen-blkback: prevent premature module unload (git-fixes).\n- xen-netback: correct success/error reporting for the SKB-with-fraglist case (git-fixes).\n- xen-netfront: remove warning when unloading module (git-fixes).\n- xen/balloon: fix balloon initialization for PVH Dom0 (git-fixes).\n- xen/balloon: fix balloon kthread freezing (git-fixes).\n- xen/balloon: fix ballooned page accounting without hotplug enabled (git-fixes).\n- xen/balloon: fix cancelled balloon action (git-fixes).\n- xen/balloon: use a kernel thread instead a workqueue (git-fixes).\n- xen/blkback: fix memory leaks (git-fixes).\n- xen/efi: Set nonblocking callbacks (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Fix off-by-one error when unmapping with holes (git-fixes).\n- xen/gntdev: Fix partial gntdev_mmap() cleanup (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/gntdev: Prevent leaking grants (git-fixes).\n- xen/grant-table: Use put_page instead of free_page (git-fixes).\n- xen/pciback: Check dev_data before using it (git-fixes).\n- xen/pciback: remove set but not used variable \u0027old_state\u0027 (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen/scsiback: add error handling for xenbus_printf (git-fixes).\n- xen/xenbus: Fix granting of vmalloc\u0027d memory (git-fixes).\n- xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status (git-fixes).\n- xen: Fix XenStore initialisation for XS_LOCAL (git-fixes).\n- xen: Fix event channel callback via INTX/GSI (git-fixes).\n- xen: XEN_ACPI_PROCESSOR is Dom0-only (git-fixes).\n- xen: add error handling for xenbus_printf (git-fixes).\n- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).\n- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (git-fixes).\n- xen: xenbus: use put_device() instead of kfree() (git-fixes).\n- xenbus: req-\u003ebody should be updated before req-\u003estate (git-fixes).\n- xenbus: req-\u003eerr should be updated before req-\u003estate (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4566,SUSE-SLE-HA-12-SP5-2022-4566,SUSE-SLE-Live-Patching-12-SP5-2022-4566,SUSE-SLE-SDK-12-SP5-2022-4566,SUSE-SLE-SERVER-12-SP5-2022-4566,SUSE-SLE-WE-12-SP5-2022-4566",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4566-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4566-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224566-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4566-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1106594",
"url": "https://bugzilla.suse.com/1106594"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164051",
"url": "https://bugzilla.suse.com/1164051"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1199365",
"url": "https://bugzilla.suse.com/1199365"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1203183",
"url": "https://bugzilla.suse.com/1203183"
},
{
"category": "self",
"summary": "SUSE Bug 1203746",
"url": "https://bugzilla.suse.com/1203746"
},
{
"category": "self",
"summary": "SUSE Bug 1203860",
"url": "https://bugzilla.suse.com/1203860"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204142",
"url": "https://bugzilla.suse.com/1204142"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204446",
"url": "https://bugzilla.suse.com/1204446"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204810",
"url": "https://bugzilla.suse.com/1204810"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1204963",
"url": "https://bugzilla.suse.com/1204963"
},
{
"category": "self",
"summary": "SUSE Bug 1205006",
"url": "https://bugzilla.suse.com/1205006"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205234",
"url": "https://bugzilla.suse.com/1205234"
},
{
"category": "self",
"summary": "SUSE Bug 1205264",
"url": "https://bugzilla.suse.com/1205264"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1205901",
"url": "https://bugzilla.suse.com/1205901"
},
{
"category": "self",
"summary": "SUSE Bug 1205902",
"url": "https://bugzilla.suse.com/1205902"
},
{
"category": "self",
"summary": "SUSE Bug 1205903",
"url": "https://bugzilla.suse.com/1205903"
},
{
"category": "self",
"summary": "SUSE Bug 1205904",
"url": "https://bugzilla.suse.com/1205904"
},
{
"category": "self",
"summary": "SUSE Bug 1205905",
"url": "https://bugzilla.suse.com/1205905"
},
{
"category": "self",
"summary": "SUSE Bug 1205906",
"url": "https://bugzilla.suse.com/1205906"
},
{
"category": "self",
"summary": "SUSE Bug 1205907",
"url": "https://bugzilla.suse.com/1205907"
},
{
"category": "self",
"summary": "SUSE Bug 1205908",
"url": "https://bugzilla.suse.com/1205908"
},
{
"category": "self",
"summary": "SUSE Bug 1206032",
"url": "https://bugzilla.suse.com/1206032"
},
{
"category": "self",
"summary": "SUSE Bug 1206037",
"url": "https://bugzilla.suse.com/1206037"
},
{
"category": "self",
"summary": "SUSE Bug 1206113",
"url": "https://bugzilla.suse.com/1206113"
},
{
"category": "self",
"summary": "SUSE Bug 1206114",
"url": "https://bugzilla.suse.com/1206114"
},
{
"category": "self",
"summary": "SUSE Bug 1206117",
"url": "https://bugzilla.suse.com/1206117"
},
{
"category": "self",
"summary": "SUSE Bug 1206118",
"url": "https://bugzilla.suse.com/1206118"
},
{
"category": "self",
"summary": "SUSE Bug 1206119",
"url": "https://bugzilla.suse.com/1206119"
},
{
"category": "self",
"summary": "SUSE Bug 1206120",
"url": "https://bugzilla.suse.com/1206120"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE Bug 1206213",
"url": "https://bugzilla.suse.com/1206213"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42328 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42329 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-19T12:50:20Z",
"generator": {
"date": "2022-12-19T12:50:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4566-1",
"initial_release_date": "2022-12-19T12:50:20Z",
"revision_history": [
{
"date": "2022-12-19T12:50:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.144.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.144.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.144.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.144.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.144.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.144.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.144.1.aarch64",
"product_id": "kernel-default-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.144.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.144.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.144.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.144.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.144.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.144.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.144.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.144.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.144.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.144.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.144.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.144.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.144.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.144.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.144.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.144.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.144.1.noarch",
"product_id": "kernel-devel-4.12.14-122.144.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.144.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.144.1.noarch",
"product_id": "kernel-docs-4.12.14-122.144.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.144.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.144.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.144.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.144.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.144.1.noarch",
"product_id": "kernel-macros-4.12.14-122.144.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.144.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.144.1.noarch",
"product_id": "kernel-source-4.12.14-122.144.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.144.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.144.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.144.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.144.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.144.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.144.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.144.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.144.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.144.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.144.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.144.1.s390x",
"product_id": "kernel-default-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.144.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.144.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.144.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.144.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.144.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.144.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.144.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.144.1.s390x",
"product_id": "kernel-syms-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.144.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.144.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.144.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.144.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.144.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.144.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.144.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.144.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.144.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.144.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.144.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.144.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.144.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.144.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.144.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.144.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.144.1.x86_64",
"product_id": "kernel-default-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.144.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.144.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.144.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.144.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.144.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.144.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.144.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.144.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.144.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.144.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.144.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.144.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.144.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.144.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.144.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.144.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.144.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.144.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.144.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.144.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.144.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.144.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.144.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.144.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.144.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.144.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.144.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.144.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.144.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.144.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.144.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.144.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.144.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.144.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.144.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.144.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.144.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.144.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.144.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.144.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.144.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.144.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.144.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.144.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3643"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3643",
"url": "https://www.suse.com/security/cve/CVE-2022-3643"
},
{
"category": "external",
"summary": "SUSE Bug 1206113 for CVE-2022-3643",
"url": "https://bugzilla.suse.com/1206113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42328"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42328",
"url": "https://www.suse.com/security/cve/CVE-2022-42328"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42328",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42329"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42329",
"url": "https://www.suse.com/security/cve/CVE-2022-42329"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42329",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-1-8.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.144.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.144.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:50:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4589-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bsc#1203322).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n- CVE-2022-3625: Fixed a user-after-free vulnerability in devlink_param_set/devlink_param_get of the file net/core/devlink.c (bsc#1204637).\n- CVE-2022-3535: Fixed a memory leak in mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bsc#1204417).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-39189: Fixed an issue were an unprivileged guest users can compromise the guest kernel because TLB flush operations were mishandled in certain KVM_VCPU_PREEMPTED situations (bsc#1203066).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).\n- CVE-2022-2153: Fixed a NULL pointer dereference in the KVM subsystem, when attempting to set a SynIC IRQ (bsc#1200788).\n- CVE-2022-2978: Fixed a use-after-free in the NILFS file system (bsc#1202700).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017).\n- Drivers: hv: vmbus: Allow cleanup of VMBUS_CONNECT_CPU if disconnected (bsc#1204017).\n- Drivers: hv: vmbus: Always handle the VMBus messages on CPU0 (bsc#1204017).\n- Drivers: hv: vmbus: Do not bind the offer\u0026rescind works to a specific CPU (bsc#1204017).\n- Drivers: hv: vmbus: Drop error message when \u0027No request id available\u0027 (bsc#1204017).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).\n- Drivers: hv: vmbus: Move __vmbus_open() (bsc#1204017).\n- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).\n- Drivers: hv: vmbus: Replace smp_store_mb() with virt_store_mb() (bsc#1204017).\n- Drivers: hv: vmbus: Replace the per-CPU channel lists with a global array of channels (bsc#1204017).\n- Drivers: hv: vmbus: Use a spin lock for synchronizing channel scheduling vs. channel removal (bsc#1204017).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).\n- PCI: hv: Add hibernation support (bsc#1204446).\n- PCI: hv: Add validation for untrusted Hyper-V values (bsc#1204017).\n- PCI: hv: Drop msi_controller structure (bsc#1204446).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (bsc#1199365).\n- PCI: hv: Fix a race condition when removing the device (bsc#1204446).\n- PCI: hv: Fix hibernation in case interrupts are not re-created (bsc#1204446).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017, bsc#1203860).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).\n- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Prepare hv_compose_msi_msg() for the VMBus-channel-interrupt-to-vCPU reassignment functionality (bsc#1204017).\n- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).\n- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: hv: Support for create interrupt v3 (bsc#1204446).\n- PCI: hv: Use PCI_ERROR_RESPONSE to identify config read errors (bsc#1204446).\n- PCI: hv: Use struct_size() helper (bsc#1204446).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1204053 bsc#1201725).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_netvsc: Add error handling while switching data path (bsc#1204850).\n- hv_netvsc: Add the support of hibernation (bsc#1204017).\n- hv_netvsc: Add validation for untrusted Hyper-V values (bsc#1204017).\n- hv_netvsc: Cache the current data path to avoid duplicate call and message (bsc#1204017).\n- hv_netvsc: Check VF datapath when sending traffic to VF (bsc#1204017).\n- hv_netvsc: Fix hibernation for mlx5 VF driver (bsc#1204850).\n- hv_netvsc: Fix potential dereference of NULL pointer (bsc#1204017).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (bsc#1204017).\n- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).\n- hv_netvsc: Remove unnecessary round_up for recv_completion_cnt (bsc#1204017).\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (bsc#1204017).\n- hv_netvsc: Switch the data path at the right time during hibernation (bsc#1204850).\n- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).\n- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).\n- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).\n- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).\n- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).\n- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).\n- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- xfs: reserve data and rt quota at the same time (bsc#1203496).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4589,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4589,SUSE-SLE-Product-HA-15-SP2-2022-4589,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4589,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4589,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4589,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4589,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4589,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4589,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4589,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4589,SUSE-Storage-7-2022-4589",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4589-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4589-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224589-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4589-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1198702",
"url": "https://bugzilla.suse.com/1198702"
},
{
"category": "self",
"summary": "SUSE Bug 1199365",
"url": "https://bugzilla.suse.com/1199365"
},
{
"category": "self",
"summary": "SUSE Bug 1200788",
"url": "https://bugzilla.suse.com/1200788"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1201725",
"url": "https://bugzilla.suse.com/1201725"
},
{
"category": "self",
"summary": "SUSE Bug 1202686",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "self",
"summary": "SUSE Bug 1202700",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203066",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "self",
"summary": "SUSE Bug 1203067",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203322",
"url": "https://bugzilla.suse.com/1203322"
},
{
"category": "self",
"summary": "SUSE Bug 1203391",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "self",
"summary": "SUSE Bug 1203496",
"url": "https://bugzilla.suse.com/1203496"
},
{
"category": "self",
"summary": "SUSE Bug 1203511",
"url": "https://bugzilla.suse.com/1203511"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203860",
"url": "https://bugzilla.suse.com/1203860"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204053",
"url": "https://bugzilla.suse.com/1204053"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE Bug 1204168",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "self",
"summary": "SUSE Bug 1204170",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "self",
"summary": "SUSE Bug 1204228",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204355",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "self",
"summary": "SUSE Bug 1204402",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204415",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "self",
"summary": "SUSE Bug 1204417",
"url": "https://bugzilla.suse.com/1204417"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204432",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204446",
"url": "https://bugzilla.suse.com/1204446"
},
{
"category": "self",
"summary": "SUSE Bug 1204470",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "self",
"summary": "SUSE Bug 1204479",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204575",
"url": "https://bugzilla.suse.com/1204575"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204635",
"url": "https://bugzilla.suse.com/1204635"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204637",
"url": "https://bugzilla.suse.com/1204637"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204745",
"url": "https://bugzilla.suse.com/1204745"
},
{
"category": "self",
"summary": "SUSE Bug 1204780",
"url": "https://bugzilla.suse.com/1204780"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205700",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205711",
"url": "https://bugzilla.suse.com/1205711"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4037 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2153 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2978 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3176 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3521 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3535 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3625 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3707 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39189 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-20T12:46:34Z",
"generator": {
"date": "2022-12-20T12:46:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4589-1",
"initial_release_date": "2022-12-20T12:46:34Z",
"revision_history": [
{
"date": "2022-12-20T12:46:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-default-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"product_id": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.139.1.aarch64",
"product_id": "kernel-syms-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.139.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.139.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"product_id": "kernel-devel-5.3.18-150200.24.139.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"product_id": "kernel-docs-5.3.18-150200.24.139.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150200.24.139.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150200.24.139.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150200.24.139.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"product_id": "kernel-macros-5.3.18-150200.24.139.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150200.24.139.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch",
"product_id": "kernel-source-5.3.18-150200.24.139.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150200.24.139.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150200.24.139.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150200.24.139.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-default-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150200.24.139.1.s390x",
"product_id": "kernel-default-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"product_id": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.139.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.139.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150200.24.139.1.s390x",
"product_id": "kernel-syms-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150200.24.139.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.139.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-debug-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-default-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"product_id": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_139-preempt-1-150200.5.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_139-preempt-1-150200.5.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_139-preempt-1-150200.5.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"product_id": "kernel-syms-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.139.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.139.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7",
"product": {
"name": "SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.139.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.139.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.139.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.139.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.139.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.139.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.139.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4037"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4037",
"url": "https://www.suse.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2021-4037",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2022-2153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2153"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2153",
"url": "https://www.suse.com/security/cve/CVE-2022-2153"
},
{
"category": "external",
"summary": "SUSE Bug 1200788 for CVE-2022-2153",
"url": "https://bugzilla.suse.com/1200788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2978"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2978",
"url": "https://www.suse.com/security/cve/CVE-2022-2978"
},
{
"category": "external",
"summary": "SUSE Bug 1202700 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "external",
"summary": "SUSE Bug 1204745 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1204745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3176"
}
],
"notes": [
{
"category": "general",
"text": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn\u0027t handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3176",
"url": "https://www.suse.com/security/cve/CVE-2022-3176"
},
{
"category": "external",
"summary": "SUSE Bug 1203391 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "external",
"summary": "SUSE Bug 1203511 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-3176"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-3521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3521"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3521",
"url": "https://www.suse.com/security/cve/CVE-2022-3521"
},
{
"category": "external",
"summary": "SUSE Bug 1204355 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3535"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3535",
"url": "https://www.suse.com/security/cve/CVE-2022-3535"
},
{
"category": "external",
"summary": "SUSE Bug 1204417 for CVE-2022-3535",
"url": "https://bugzilla.suse.com/1204417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "low"
}
],
"title": "CVE-2022-3535"
},
{
"cve": "CVE-2022-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3542",
"url": "https://www.suse.com/security/cve/CVE-2022-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1204402 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3594"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3594",
"url": "https://www.suse.com/security/cve/CVE-2022-3594"
},
{
"category": "external",
"summary": "SUSE Bug 1204479 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3625"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3625",
"url": "https://www.suse.com/security/cve/CVE-2022-3625"
},
{
"category": "external",
"summary": "SUSE Bug 1204637 for CVE-2022-3625",
"url": "https://bugzilla.suse.com/1204637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3629"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3629",
"url": "https://www.suse.com/security/cve/CVE-2022-3629"
},
{
"category": "external",
"summary": "SUSE Bug 1204635 for CVE-2022-3629",
"url": "https://bugzilla.suse.com/1204635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "low"
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3707"
}
],
"notes": [
{
"category": "general",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3707",
"url": "https://www.suse.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "SUSE Bug 1204780 for CVE-2022-3707",
"url": "https://bugzilla.suse.com/1204780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39189"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39189",
"url": "https://www.suse.com/security/cve/CVE-2022-39189"
},
{
"category": "external",
"summary": "SUSE Bug 1203066 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "external",
"summary": "SUSE Bug 1203067 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-40307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40307"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40307",
"url": "https://www.suse.com/security/cve/CVE-2022-40307"
},
{
"category": "external",
"summary": "SUSE Bug 1203322 for CVE-2022-40307",
"url": "https://bugzilla.suse.com/1203322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4129"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4129",
"url": "https://www.suse.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "SUSE Bug 1205711 for CVE-2022-4129",
"url": "https://bugzilla.suse.com/1205711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42703"
}
],
"notes": [
{
"category": "general",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42703",
"url": "https://www.suse.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "SUSE Bug 1204168 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "external",
"summary": "SUSE Bug 1204170 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "external",
"summary": "SUSE Bug 1206463 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1206463"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-1-150200.5.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.139.1.150200.9.65.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.139.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.139.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:46:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2023:2146-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-1872:Fixed a use after free vulnerability in the io_uring subsystem, which could lead to local privilege escalation (bsc#1210414).\n- CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-2176: A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege (bsc#1210629).\n- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).\n- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).\n- CVE-2023-2008: A flaw was found in the fault handler of the udmabuf device driver. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code (bsc#1210453).\n- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).\n- CVE-2020-36691: Fixed a denial of service (unbounded recursion) vulnerability via a nested Netlink policy with a back reference (bsc#1209613 bsc#1209777).\n- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).\n- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).\n\nThe following non-security bugs were fixed:\n\n- Drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).\n- Replace mkinitrd dependency with dracut (bsc#1202353).\n- cifs: fix negotiate context parsing (bsc#1210301).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2146,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2146,SUSE-SLE-Product-HA-15-SP2-2023-2146,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2146,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2146,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2146,SUSE-Storage-7-2023-2146",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2146-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2146-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232146-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2146-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html"
},
{
"category": "self",
"summary": "SUSE Bug 1202353",
"url": "https://bugzilla.suse.com/1202353"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1206992",
"url": "https://bugzilla.suse.com/1206992"
},
{
"category": "self",
"summary": "SUSE Bug 1209613",
"url": "https://bugzilla.suse.com/1209613"
},
{
"category": "self",
"summary": "SUSE Bug 1209687",
"url": "https://bugzilla.suse.com/1209687"
},
{
"category": "self",
"summary": "SUSE Bug 1209777",
"url": "https://bugzilla.suse.com/1209777"
},
{
"category": "self",
"summary": "SUSE Bug 1209871",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "self",
"summary": "SUSE Bug 1210202",
"url": "https://bugzilla.suse.com/1210202"
},
{
"category": "self",
"summary": "SUSE Bug 1210203",
"url": "https://bugzilla.suse.com/1210203"
},
{
"category": "self",
"summary": "SUSE Bug 1210301",
"url": "https://bugzilla.suse.com/1210301"
},
{
"category": "self",
"summary": "SUSE Bug 1210329",
"url": "https://bugzilla.suse.com/1210329"
},
{
"category": "self",
"summary": "SUSE Bug 1210336",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "self",
"summary": "SUSE Bug 1210337",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "self",
"summary": "SUSE Bug 1210414",
"url": "https://bugzilla.suse.com/1210414"
},
{
"category": "self",
"summary": "SUSE Bug 1210417",
"url": "https://bugzilla.suse.com/1210417"
},
{
"category": "self",
"summary": "SUSE Bug 1210453",
"url": "https://bugzilla.suse.com/1210453"
},
{
"category": "self",
"summary": "SUSE Bug 1210469",
"url": "https://bugzilla.suse.com/1210469"
},
{
"category": "self",
"summary": "SUSE Bug 1210506",
"url": "https://bugzilla.suse.com/1210506"
},
{
"category": "self",
"summary": "SUSE Bug 1210629",
"url": "https://bugzilla.suse.com/1210629"
},
{
"category": "self",
"summary": "SUSE Bug 1210647",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36691 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2196 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1611 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1670 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1838 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1855 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1872 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1989 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1990 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1998 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2008 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2162 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2176 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-30772 page",
"url": "https://www.suse.com/security/cve/CVE-2023-30772/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-05-09T15:03:56Z",
"generator": {
"date": "2023-05-09T15:03:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2146-1",
"initial_release_date": "2023-05-09T15:03:56Z",
"revision_history": [
{
"date": "2023-05-09T15:03:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-default-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"product_id": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.151.1.aarch64",
"product_id": "kernel-syms-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.151.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.151.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150200.24.151.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150200.24.151.1.noarch",
"product_id": "kernel-devel-5.3.18-150200.24.151.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150200.24.151.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150200.24.151.1.noarch",
"product_id": "kernel-docs-5.3.18-150200.24.151.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150200.24.151.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150200.24.151.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150200.24.151.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150200.24.151.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150200.24.151.1.noarch",
"product_id": "kernel-macros-5.3.18-150200.24.151.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150200.24.151.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150200.24.151.1.noarch",
"product_id": "kernel-source-5.3.18-150200.24.151.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150200.24.151.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150200.24.151.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150200.24.151.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-default-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150200.24.151.1.s390x",
"product_id": "kernel-default-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"product_id": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.151.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.151.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150200.24.151.1.s390x",
"product_id": "kernel-syms-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150200.24.151.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.151.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-debug-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-default-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"product_id": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.151.1.150200.9.73.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_151-preempt-1-150200.5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_151-preempt-1-150200.5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_151-preempt-1-150200.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.151.1.x86_64",
"product_id": "kernel-syms-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.151.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.151.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7",
"product": {
"name": "SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.151.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.151.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.151.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.151.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.151.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.151.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.151.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.151.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.151.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36691"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36691",
"url": "https://www.suse.com/security/cve/CVE-2020-36691"
},
{
"category": "external",
"summary": "SUSE Bug 1209613 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209613"
},
{
"category": "external",
"summary": "SUSE Bug 1209777 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2022-2196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2196"
}
],
"notes": [
{
"category": "general",
"text": "A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn\u0027t need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2196",
"url": "https://www.suse.com/security/cve/CVE-2022-2196"
},
{
"category": "external",
"summary": "SUSE Bug 1206992 for CVE-2022-2196",
"url": "https://bugzilla.suse.com/1206992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2022-2196"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2023-1611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1611"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1611",
"url": "https://www.suse.com/security/cve/CVE-2023-1611"
},
{
"category": "external",
"summary": "SUSE Bug 1209687 for CVE-2023-1611",
"url": "https://bugzilla.suse.com/1209687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1670"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1670",
"url": "https://www.suse.com/security/cve/CVE-2023-1670"
},
{
"category": "external",
"summary": "SUSE Bug 1209871 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1838"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1838",
"url": "https://www.suse.com/security/cve/CVE-2023-1838"
},
{
"category": "external",
"summary": "SUSE Bug 1210203 for CVE-2023-1838",
"url": "https://bugzilla.suse.com/1210203"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-1838"
},
{
"cve": "CVE-2023-1855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1855"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1855",
"url": "https://www.suse.com/security/cve/CVE-2023-1855"
},
{
"category": "external",
"summary": "SUSE Bug 1210202 for CVE-2023-1855",
"url": "https://bugzilla.suse.com/1210202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1872"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx-\u003euring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1872",
"url": "https://www.suse.com/security/cve/CVE-2023-1872"
},
{
"category": "external",
"summary": "SUSE Bug 1210414 for CVE-2023-1872",
"url": "https://bugzilla.suse.com/1210414"
},
{
"category": "external",
"summary": "SUSE Bug 1210417 for CVE-2023-1872",
"url": "https://bugzilla.suse.com/1210417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "important"
}
],
"title": "CVE-2023-1872"
},
{
"cve": "CVE-2023-1989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1989"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1989",
"url": "https://www.suse.com/security/cve/CVE-2023-1989"
},
{
"category": "external",
"summary": "SUSE Bug 1210336 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "external",
"summary": "SUSE Bug 1210500 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210500"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "important"
}
],
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1990"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1990",
"url": "https://www.suse.com/security/cve/CVE-2023-1990"
},
{
"category": "external",
"summary": "SUSE Bug 1210337 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "external",
"summary": "SUSE Bug 1210501 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210501"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1998"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1998",
"url": "https://www.suse.com/security/cve/CVE-2023-1998"
},
{
"category": "external",
"summary": "SUSE Bug 1210506 for CVE-2023-1998",
"url": "https://bugzilla.suse.com/1210506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-2008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2008"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2008",
"url": "https://www.suse.com/security/cve/CVE-2023-2008"
},
{
"category": "external",
"summary": "SUSE Bug 1210453 for CVE-2023-2008",
"url": "https://bugzilla.suse.com/1210453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-2008"
},
{
"cve": "CVE-2023-2162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2162"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2162",
"url": "https://www.suse.com/security/cve/CVE-2023-2162"
},
{
"category": "external",
"summary": "SUSE Bug 1210647 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "external",
"summary": "SUSE Bug 1210662 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210662"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2176"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2176",
"url": "https://www.suse.com/security/cve/CVE-2023-2176"
},
{
"category": "external",
"summary": "SUSE Bug 1210629 for CVE-2023-2176",
"url": "https://bugzilla.suse.com/1210629"
},
{
"category": "external",
"summary": "SUSE Bug 1210630 for CVE-2023-2176",
"url": "https://bugzilla.suse.com/1210630"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-2176",
"url": "https://bugzilla.suse.com/1213842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "important"
}
],
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-30772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-30772"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-30772",
"url": "https://www.suse.com/security/cve/CVE-2023-30772"
},
{
"category": "external",
"summary": "SUSE Bug 1210329 for CVE-2023-30772",
"url": "https://bugzilla.suse.com/1210329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_151-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.151.1.150200.9.73.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.151.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.151.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.151.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-09T15:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2023-30772"
}
]
}
suse-su-2022:4615-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bsc#1203322).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).\n- CVE-2022-2153: Fixed a NULL pointer dereference in the KVM subsystem, when attempting to set a SynIC IRQ (bsc#1200788).\n- CVE-2022-41848: Fixed a race condition in drivers/char/pcmcia/synclink_cs.c mgslpc_ioctl and mgslpc_detach (bsc#1203987).\n\nThe following non-security bugs were fixed:\n\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- sunrpc: Re-purpose trace_svc_process (bsc#1205006).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- x86/hyperv: Set pv_info.name to \u0027Hyper-V\u0027 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4615,SUSE-OpenStack-Cloud-9-2022-4615,SUSE-OpenStack-Cloud-Crowbar-9-2022-4615,SUSE-SLE-HA-12-SP4-2022-4615,SUSE-SLE-Live-Patching-12-SP4-2022-4615,SUSE-SLE-SAP-12-SP4-2022-4615,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4615",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4615-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4615-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224615-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4615-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1198702",
"url": "https://bugzilla.suse.com/1198702"
},
{
"category": "self",
"summary": "SUSE Bug 1200788",
"url": "https://bugzilla.suse.com/1200788"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1202686",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203183",
"url": "https://bugzilla.suse.com/1203183"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203322",
"url": "https://bugzilla.suse.com/1203322"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE Bug 1204168",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "self",
"summary": "SUSE Bug 1204170",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204355",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "self",
"summary": "SUSE Bug 1204402",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204415",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204432",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204479",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204635",
"url": "https://bugzilla.suse.com/1204635"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1205006",
"url": "https://bugzilla.suse.com/1205006"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1206113",
"url": "https://bugzilla.suse.com/1206113"
},
{
"category": "self",
"summary": "SUSE Bug 1206114",
"url": "https://bugzilla.suse.com/1206114"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4037 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2153 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3521 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42328 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42329 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-23T09:44:36Z",
"generator": {
"date": "2022-12-23T09:44:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4615-1",
"initial_release_date": "2022-12-23T09:44:36Z",
"revision_history": [
{
"date": "2022-12-23T09:44:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.114.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.114.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.114.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.114.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.114.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.114.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.114.1.aarch64",
"product_id": "kernel-default-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.114.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.114.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.114.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.114.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.114.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.114.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.114.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.114.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.114.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.114.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.114.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.114.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.114.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.114.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.114.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.114.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.114.1.noarch",
"product_id": "kernel-devel-4.12.14-95.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.114.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.114.1.noarch",
"product_id": "kernel-docs-4.12.14-95.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.114.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.114.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.114.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.114.1.noarch",
"product_id": "kernel-macros-4.12.14-95.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.114.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.114.1.noarch",
"product_id": "kernel-source-4.12.14-95.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.114.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.114.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.114.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.114.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.114.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.114.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.114.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.114.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.114.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.114.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.114.1.s390x",
"product_id": "kernel-default-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.114.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.114.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.114.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.114.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.114.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.114.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.114.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.114.1.s390x",
"product_id": "kernel-syms-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.114.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.114.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.114.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.114.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.114.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.114.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.114.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.114.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.114.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.114.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.114.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.114.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.114.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.114.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.114.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.114.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.114.1.x86_64",
"product_id": "kernel-default-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.114.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.114.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.114.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.114.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.114.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.114.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.114.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.114.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.114.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.114.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.114.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.114.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.114.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.114.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.114.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.114.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.114.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.114.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.114.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.114.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.114.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.114.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.114.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.114.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.114.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.114.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.114.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.114.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.114.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.114.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.114.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.114.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.114.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.114.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.114.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.114.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.114.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.114.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.114.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.114.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.114.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.114.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.114.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.114.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.114.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4037"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4037",
"url": "https://www.suse.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2021-4037",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2022-2153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2153"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2153",
"url": "https://www.suse.com/security/cve/CVE-2022-2153"
},
{
"category": "external",
"summary": "SUSE Bug 1200788 for CVE-2022-2153",
"url": "https://bugzilla.suse.com/1200788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-3521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3521"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3521",
"url": "https://www.suse.com/security/cve/CVE-2022-3521"
},
{
"category": "external",
"summary": "SUSE Bug 1204355 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3542",
"url": "https://www.suse.com/security/cve/CVE-2022-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1204402 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3594"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3594",
"url": "https://www.suse.com/security/cve/CVE-2022-3594"
},
{
"category": "external",
"summary": "SUSE Bug 1204479 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3629"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3629",
"url": "https://www.suse.com/security/cve/CVE-2022-3629"
},
{
"category": "external",
"summary": "SUSE Bug 1204635 for CVE-2022-3629",
"url": "https://bugzilla.suse.com/1204635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "low"
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3643"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3643",
"url": "https://www.suse.com/security/cve/CVE-2022-3643"
},
{
"category": "external",
"summary": "SUSE Bug 1206113 for CVE-2022-3643",
"url": "https://bugzilla.suse.com/1206113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-40307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40307"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40307",
"url": "https://www.suse.com/security/cve/CVE-2022-40307"
},
{
"category": "external",
"summary": "SUSE Bug 1203322 for CVE-2022-40307",
"url": "https://bugzilla.suse.com/1203322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42328"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42328",
"url": "https://www.suse.com/security/cve/CVE-2022-42328"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42328",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42329"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42329",
"url": "https://www.suse.com/security/cve/CVE-2022-42329"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42329",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42703"
}
],
"notes": [
{
"category": "general",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42703",
"url": "https://www.suse.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "SUSE Bug 1204168 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "external",
"summary": "SUSE Bug 1204170 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "external",
"summary": "SUSE Bug 1206463 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1206463"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "important"
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_114-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.114.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.114.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.114.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:44:36Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4516-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_93 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3640: Fixed a use-after-free in l2cap_conn_del of the file net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4516,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4516",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4516-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4516-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224516-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4516-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-16T21:06:18Z",
"generator": {
"date": "2022-12-16T21:06:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4516-1",
"initial_release_date": "2022-12-16T21:06:18Z",
"revision_history": [
{
"date": "2022-12-16T21:06:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_93-preempt-5-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_93-preempt-5-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_93-preempt-5-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4503-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c of the component IPsec (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() of the component IPv6 Handler (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).\n- ALSA: hda: fix potential memleak in \u0027add_widget_node\u0027 (git-fixes).\n- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).\n- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).\n- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).\n- ASoC: codecs: jz4725b: Fix spelling mistake \u0027Sourc\u0027 -\u003e \u0027Source\u0027, \u0027Routee\u0027 -\u003e \u0027Route\u0027 (git-fixes).\n- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).\n- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).\n- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).\n- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).\n- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).\n- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).\n- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).\n- ASoC: wm5102: Revert \u0027ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe\u0027 (git-fixes).\n- ASoC: wm5110: Revert \u0027ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe\u0027 (git-fixes).\n- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).\n- ASoC: wm8997: Revert \u0027ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe\u0027 (git-fixes).\n- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).\n- Do not enable CONFIG_ATARI_PARTITION (jsc#PED-1573)\n- Drivers: hv: vmbus: Add /sys/bus/vmbus/hibernation (git-fixes).\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017).\n- Drivers: hv: vmbus: Drop error message when \u0027No request id available\u0027 (bsc#1204017).\n- Drivers: hv: vmbus: Fix duplicate CPU assignments within a device (git-fixes).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).\n- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).\n- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).\n- Drivers: hv: vmbus: Remove unused linux/version.h header (git-fixes).\n- Drivers: hv: vmbus: Replace smp_store_mb() with virt_store_mb() (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: remove unused function (git-fixes).\n- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).\n- Input: i8042 - fix leaking of platform device on module removal (git-fixes).\n- Input: iforce - invert valid length check when fetching device IDs (git-fixes).\n- KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support (git-fixes).\n- KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1 (git-fixes).\n- KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT) (git-fixes).\n- KVM: nVMX: clear PIN_BASED_POSTED_INTR from nested pinbased_ctls only when apicv is globally disabled (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes).\n- KVM: s390: Fix handle_sske page fault handling (git-fixes).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes).\n- KVM: s390: get rid of register asm usage (git-fixes).\n- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).\n- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).\n- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).\n- KVM: s390: reduce number of IO pins to 1 (git-fixes).\n- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).\n- NFS: Refactor nfs_instantiate() for dentry referencing callers (bsc#1204215).\n- NFSv3: use nfs_add_or_obtain() to create and reference inodes (bsc#1204215).\n- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).\n- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).\n- PCI: hv: Drop msi_controller structure (bsc#1204446).\n- PCI: hv: Fix a race condition when removing the device (bsc#1204446).\n- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).\n- PCI: hv: Fix typo (bsc#1204446).\n- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).\n- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).\n- PCI: hv: Support for create interrupt v3 (bsc#1204446).\n- PCI: hv: Use PCI_ERROR_RESPONSE to identify config read errors (bsc#1204446).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- RDMA/core/sa_query: Remove unused argument (git-fixes)\n- RDMA/hns: Fix spelling mistakes of original (git-fixes)\n- RDMA/qedr: Add support for user mode XRC-SRQ\u0027s (git-fixes)\n- RDMA/qedr: Fix reporting max_{send/recv}_wr attrs (git-fixes)\n- RDMA/qedr: Remove unsupported qedr_resize_cq callback (git-fixes)\n- RDMA/rxe: Fix memory leak in error path code (git-fixes)\n- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).\n- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID.\n- Xen/gntdev: do not ignore kernel unmapping error (git-fixes).\n- add another bug reference to some hyperv changes (bsc#1205617).\n- arm/xen: Do not probe xenbus as part of an early initcall (git-fixes).\n- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes)\n- arm64: dts: juno: Add thermal critical trip points (git-fixes)\n- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).\n- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).\n- blk-crypto: fix check for too-large dun_bytes (git-fixes).\n- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).\n- blk-mq: do not create hctx debugfs dir until q-\u003edebugfs_dir is created (git-fixes).\n- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern (git-fixes).\n- block: Add a helper to validate the block size (git-fixes).\n- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1204328).\n- block: ataflop: fix breakage introduced at blk-mq refactoring (git-fixes).\n- block: ataflop: more blk-mq refactoring fixes (git-fixes).\n- block: fix infinite loop for invalid zone append (git-fixes).\n- block: limit request dispatch loop duration (git-fixes).\n- block: nbd: add sanity check for first_minor (git-fixes).\n- block: use \u0027unsigned long\u0027 for blk_validate_block_size() (git-fixes).\n- bus: sunxi-rsb: Support atomic transfers (git-fixes).\n- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).\n- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).\n- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1205989).\n- ceph: do not access the kiocb after aio requests (bsc#1205984).\n- ceph: fix fscache invalidation (bsc#1205985).\n- ceph: lockdep annotations for try_nonblocking_invalidate (bsc#1205988).\n- ceph: remove bogus checks and WARN_ONs from ceph_set_page_dirty (bsc#1205986).\n- ceph: request Fw caps before updating the mtime in ceph_write_iter (bsc#1205987).\n- cifs: skip extra NULL byte in filenames (bsc#1204791).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm integrity: set journal entry unused when shrinking device (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm raid: fix address sanitizer warning in raid_resume (git-fixes).\n- dm raid: fix address sanitizer warning in raid_status (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm verity fec: fix misaligned RS roots IO (git-fixes).\n- dm writecache: fix writing beyond end of underlying device when shrinking (git-fixes).\n- dm writecache: return the exact table values that were set (git-fixes).\n- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).\n- dm: fix request-based DM to not bounce through indirect dm_submit_bio (git-fixes).\n- dm: remove special-casing of bio-based immutable singleton target on NVMe (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).\n- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).\n- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).\n- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).\n- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).\n- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).\n- dmaengine: at_hdmac: Fix impossible condition (git-fixes).\n- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).\n- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).\n- drivers/hv: remove obsolete TODO and fix misleading typo in comment (git-fixes).\n- drivers: hv: Fix EXPORT_SYMBOL and tab spaces issue (git-fixes).\n- drivers: hv: Fix hyperv_record_panic_msg path on comment (git-fixes).\n- drivers: hv: Fix missing error code in vmbus_connect() (git-fixes).\n- drivers: hv: vmbus: Fix call msleep using \u0026lt; 20ms (git-fixes).\n- drivers: hv: vmbus: Fix checkpatch LINE_SPACING (git-fixes).\n- drivers: hv: vmbus: Fix checkpatch SPLIT_STRING (git-fixes).\n- drivers: hv: vmbus: Replace symbolic permissions by octal permissions (git-fixes).\n- drivers: net: slip: fix NPD bug in sl_tx_timeout() (git-fixes).\n- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).\n- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).\n- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).\n- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).\n- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).\n- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).\n- drm/rockchip: dsi: Force synchronous probe (git-fixes).\n- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).\n- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).\n- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).\n- firmware: arm_scmi: Suppress the driver\u0027s bind attributes (git-fixes).\n- ftrace: Fix char print issue in print_ip_ins() (git-fixes).\n- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).\n- fuse: add file_modified() to fallocate (bsc#1205330).\n- fuse: fix readdir cache race (bsc#1205329).\n- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).\n- hv: hyperv.h: Remove unused inline functions (git-fixes).\n- hv_netvsc: Add a comment clarifying batching logic (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_netvsc: Add error handling while switching data path (bsc#1204850).\n- hv_netvsc: Allocate the recv_buf buffers after NVSP_MSG1_TYPE_SEND_RECV_BUF (git-fixes).\n- hv_netvsc: Check VF datapath when sending traffic to VF (git-fixes).\n- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).\n- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).\n- hv_netvsc: Use bitmap_zalloc() when applicable (git-fixes).\n- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- hv_netvsc: Validate number of allocated sub-channels (git-fixes).\n- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).\n- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).\n- hv_utils: Fix passing zero to \u0027PTR_ERR\u0027 warning (git-fixes).\n- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).\n- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).\n- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).\n- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).\n- i2c: i801: add lis3lv02d\u0027s I2C address for Vostro 5568 (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).\n- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).\n- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).\n- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).\n- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).\n- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).\n- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).\n- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).\n- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).\n- iwlwifi: dbg: disable ini debug in 9000 family and below (git-fixes).\n- kABI: Fix after adding trace_iterator.wait_index (git-fixes).\n- kABI: remove new member of usbip_device (git-fixes).\n- kabi: fix transport_add_device change (git-fixes).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- kvm: nVMX: reflect MTF VM-exits if injected by L1 (git-fixes).\n- loop: Check for overflow while configuring loop (git-fixes).\n- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes).\n- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).\n- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).\n- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).\n- media: venus: dec: Handle the case where find_format fails (git-fixes).\n- media: vim2m: initialize the media device earlier (git-fixes).\n- media: vivid: fix assignment of dev-\u003efbuf_out_flags (git-fixes).\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).\n- mmc: core: properly select voltage range without power cycle (git-fixes).\n- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).\n- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).\n- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).\n- nbd: Fix use-after-free in pid_show (git-fixes).\n- nbd: fix possible overflow for \u0027first_minor\u0027 in nbd_dev_add() (git-fixes).\n- nbd: fix possible overflow on \u0027first_minor\u0027 in nbd_dev_add() (git-fixes).\n- nbd: handle device refs for DESTROY_ON_DISCONNECT properly (git-fixes).\n- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).\n- net: ethernet: nixge: fix NULL dereference (git-fixes).\n- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- net: phy: fix null-ptr-deref while probe() failed (git-fixes).\n- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).\n- net: usb: qmi_wwan: Set DTR quirk for MR400 (git-fixes).\n- net: usb: qmi_wwan: restore mtu min/max values after raw_ip switch (git-fixes).\n- nfc/nci: fix race with opening and closing (git-fixes).\n- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).\n- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).\n- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).\n- nfsd: set the server_scope during service startup (bsc#1203746).\n- null_blk: Fail zone append to conventional zones (git-fixes).\n- null_blk: synchronization fix for zoned device (git-fixes).\n- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- parport_pc: Avoid FIFO port location truncation (git-fixes).\n- phy: stm32: fix an error code in probe (git-fixes).\n- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).\n- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).\n- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).\n- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).\n- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).\n- printk: use atomic updates for klogd work (bsc#1204934).\n- printk: wake waiters for safe and NMI contexts (bsc#1204934).\n- r8152: Add MAC passthrough support to new device (git-fixes).\n- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).\n- r8152: use new helper tcp_v6_gso_csum_prep (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- regulator: core: fix UAF in destroy_regulator() (git-fixes).\n- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).\n- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).\n- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Allow splice to read previous partially read pages (git-fixes).\n- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).\n- ring-buffer: Fix race between reset page and reading page (git-fixes).\n- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).\n- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- rndis_host: increase sleep time in the query-response loop (git-fixes).\n- rtc: mt6397: fix alarm register overwrite (git-fixes).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- s390/cpcmd: fix inline assembly register clobbering (git-fixes).\n- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).\n- s390/disassembler: increase ebpf disasm buffer size (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205428 LTC#200501).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (bsc#1203144 LTC#199881).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (git-fixes).\n- s390/ptrace: return -ENOSYS when invalid syscall is supplied (git-fixes).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).\n- s390/vtime: fix inline assembly clobber list (git-fixes).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- s390/zcrypt: fix zcard and zqueue hot-unplug memleak (git-fixes).\n- s390: Remove arch_has_random, arch_has_random_seed (git-fixes).\n- s390: fix double free of GS and RI CBs on fork() failure (git-fixes).\n- s390: fix nospec table alignments (git-fixes).\n- s390: mark __cpacf_query() as __always_inline (git-fixes).\n- scsi: bsg: Remove support for SCSI_IOCTL_SEND_COMMAND (git-fixes).\n- scsi: drivers: base: Propagate errors through the transport component (git-fixes).\n- scsi: drivers: base: Support atomic version of attribute_container_device_trigger (git-fixes).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729 bsc#1204810 ltc#200162).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).\n- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).\n- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).\n- scsi: lpfc: Fix spelling mistake \u0027unsolicted\u0027 -\u003e \u0027unsolicited\u0027 (bsc#1204957).\n- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).\n- scsi: lpfc: Set sli4_param\u0027s cmf option to zero when CMF is turned off (bsc#1204957).\n- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).\n- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).\n- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).\n- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).\n- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).\n- scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).\n- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).\n- scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).\n- scsi: storvsc: Miscellaneous code cleanups (git-fixes).\n- scsi: storvsc: Parameterize number hardware queues (git-fixes).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).\n- scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).\n- scsi: storvsc: Update error logging (git-fixes).\n- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).\n- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).\n- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).\n- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).\n- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).\n- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).\n- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).\n- serial: imx: Add missing .thaw_noirq hook (git-fixes).\n- siox: fix possible memory leak in siox_device_add() (git-fixes).\n- slimbus: stream: correct presence rate frequencies (git-fixes).\n- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).\n- spi: stm32: Print summary \u0027callbacks suppressed\u0027 message (git-fixes).\n- staging: greybus: light: fix a couple double frees (git-fixes).\n- swiotlb-xen: use vmalloc_to_page on vmalloc virt addresses (git-fixes).\n- tracing/ring-buffer: Have polling block on watermark (git-fixes).\n- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).\n- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).\n- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).\n- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).\n- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).\n- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).\n- tracing: Wake up waiters when tracing is disabled (git-fixes).\n- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: fix PHY disable sequence (git-fixes).\n- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).\n- usb: dwc3: gadget: Fix null pointer exception (git-fixes).\n- usb: dwc3: qcom: fix runtime PM wakeup.\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).\n- usbip: add sysfs_lock to synchronize sysfs code paths (git-fixes).\n- usbip: stub-dev synchronize sysfs code paths (git-fixes).\n- usbip: stub_dev: remake locking for kABI (git-fixes).\n- usbip: synchronize event handler with sysfs code paths (git-fixes).\n- usbip: usbip_event: use global lock (git-fixes).\n- usbip: vudc synchronize sysfs code paths (git-fixes).\n- usbip: vudc_sysfs: use global lock (git-fixes).\n- use __netdev_notify_peers in hyperv (git-fixes).\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027 (bsc#1200845)\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- virtio_blk: eliminate anonymous module_init \u0026 module_exit (git-fixes).\n- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).\n- vmlinux.lds.h: Fix placement of \u0027.data..decrypted\u0027 section (git-fixes).\n- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).\n- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).\n- wifi: cfg80211: silence a sparse RCU warning (git-fixes).\n- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).\n- workqueue: do not skip lockdep work dependency in cancel_work_sync() (bsc#1204967).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- x86/hyperv: check cpu mask after interrupt has been disabled (git-fixes).\n- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/xen: Add xen_no_vector_callback option to test PCI INTX delivery (git-fixes).\n- x86/xen: Distribute switch variables for initialization (git-fixes).\n- x86/xen: do not unbind uninitialized lock_kicker_irq (git-fixes).\n- xen-blkback: prevent premature module unload (git-fixes).\n- xen-netback: correct success/error reporting for the SKB-with-fraglist case (git-fixes).\n- xen/balloon: fix balloon kthread freezing (git-fixes).\n- xen/balloon: fix ballooned page accounting without hotplug enabled (git-fixes).\n- xen/balloon: fix cancelled balloon action (git-fixes).\n- xen/balloon: use a kernel thread instead a workqueue (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/gntdev: Prevent leaking grants (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen/privcmd: Corrected error handling path (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/xenbus: Fix granting of vmalloc\u0027d memory (git-fixes).\n- xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status (git-fixes).\n- xen: Fix XenStore initialisation for XS_LOCAL (git-fixes).\n- xen: Fix event channel callback via INTX/GSI (git-fixes).\n- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu\u003e=32 (git-fixes).\n- xenbus: req-\u003ebody should be updated before req-\u003estate (git-fixes).\n- xenbus: req-\u003eerr should be updated before req-\u003estate (git-fixes).\n- xfs: Lower CIL flush limit for large logs (git-fixes).\n- xfs: Throttle commits on delayed background CIL push (git-fixes).\n- xfs: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- xfs: check owner of dir3 blocks (git-fixes).\n- xfs: factor common AIL item deletion code (git-fixes).\n- xfs: open code insert range extent split helper (git-fixes).\n- xfs: rework collapse range into an atomic operation (git-fixes).\n- xfs: rework insert range into an atomic operation (git-fixes).\n- xfs: tail updates only need to occur when LSN changes (git-fixes).\n- xfs: trylock underlying buffer on dquot flush (git-fixes).\n- xfs: xfs_buf_corruption_error should take __this_address (git-fixes).\n- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4503,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4503,openSUSE-SLE-15.3-2022-4503",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4503-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4503-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224503-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4503-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1189297",
"url": "https://bugzilla.suse.com/1189297"
},
{
"category": "self",
"summary": "SUSE Bug 1192761",
"url": "https://bugzilla.suse.com/1192761"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1203144",
"url": "https://bugzilla.suse.com/1203144"
},
{
"category": "self",
"summary": "SUSE Bug 1203746",
"url": "https://bugzilla.suse.com/1203746"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204142",
"url": "https://bugzilla.suse.com/1204142"
},
{
"category": "self",
"summary": "SUSE Bug 1204215",
"url": "https://bugzilla.suse.com/1204215"
},
{
"category": "self",
"summary": "SUSE Bug 1204228",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "self",
"summary": "SUSE Bug 1204241",
"url": "https://bugzilla.suse.com/1204241"
},
{
"category": "self",
"summary": "SUSE Bug 1204328",
"url": "https://bugzilla.suse.com/1204328"
},
{
"category": "self",
"summary": "SUSE Bug 1204446",
"url": "https://bugzilla.suse.com/1204446"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204693",
"url": "https://bugzilla.suse.com/1204693"
},
{
"category": "self",
"summary": "SUSE Bug 1204780",
"url": "https://bugzilla.suse.com/1204780"
},
{
"category": "self",
"summary": "SUSE Bug 1204791",
"url": "https://bugzilla.suse.com/1204791"
},
{
"category": "self",
"summary": "SUSE Bug 1204810",
"url": "https://bugzilla.suse.com/1204810"
},
{
"category": "self",
"summary": "SUSE Bug 1204827",
"url": "https://bugzilla.suse.com/1204827"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1204934",
"url": "https://bugzilla.suse.com/1204934"
},
{
"category": "self",
"summary": "SUSE Bug 1204957",
"url": "https://bugzilla.suse.com/1204957"
},
{
"category": "self",
"summary": "SUSE Bug 1204963",
"url": "https://bugzilla.suse.com/1204963"
},
{
"category": "self",
"summary": "SUSE Bug 1204967",
"url": "https://bugzilla.suse.com/1204967"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205264",
"url": "https://bugzilla.suse.com/1205264"
},
{
"category": "self",
"summary": "SUSE Bug 1205329",
"url": "https://bugzilla.suse.com/1205329"
},
{
"category": "self",
"summary": "SUSE Bug 1205330",
"url": "https://bugzilla.suse.com/1205330"
},
{
"category": "self",
"summary": "SUSE Bug 1205428",
"url": "https://bugzilla.suse.com/1205428"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205567",
"url": "https://bugzilla.suse.com/1205567"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205700",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205753",
"url": "https://bugzilla.suse.com/1205753"
},
{
"category": "self",
"summary": "SUSE Bug 1205984",
"url": "https://bugzilla.suse.com/1205984"
},
{
"category": "self",
"summary": "SUSE Bug 1205985",
"url": "https://bugzilla.suse.com/1205985"
},
{
"category": "self",
"summary": "SUSE Bug 1205986",
"url": "https://bugzilla.suse.com/1205986"
},
{
"category": "self",
"summary": "SUSE Bug 1205987",
"url": "https://bugzilla.suse.com/1205987"
},
{
"category": "self",
"summary": "SUSE Bug 1205988",
"url": "https://bugzilla.suse.com/1205988"
},
{
"category": "self",
"summary": "SUSE Bug 1205989",
"url": "https://bugzilla.suse.com/1205989"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3707 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-16T12:28:13Z",
"generator": {
"date": "2022-12-16T12:28:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4503-1",
"initial_release_date": "2022-12-16T12:28:13Z",
"revision_history": [
{
"date": "2022-12-16T12:28:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-150300.38.88.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"product_id": "kernel-source-azure-5.3.18-150300.38.88.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-150300.38.88.1.x86_64",
"product_id": "kernel-azure-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-150300.38.88.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-150300.38.88.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-150300.38.88.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-150300.38.88.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-150300.38.88.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-150300.38.88.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-150300.38.88.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3707"
}
],
"notes": [
{
"category": "general",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3707",
"url": "https://www.suse.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "SUSE Bug 1204780 for CVE-2022-3707",
"url": "https://bugzilla.suse.com/1204780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4129"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4129",
"url": "https://www.suse.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "SUSE Bug 1205711 for CVE-2022-4129",
"url": "https://bugzilla.suse.com/1205711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.88.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.88.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4585-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-45869: Fixed a race condition in the x86 KVM subsystem which could cause a denial of service (bsc#1205882).\n- CVE-2022-45888: Fixed a use-after-free during physical removal of a USB devices when using drivers/char/xillybus/xillyusb.c (bsc#1205764).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-3566: Fixed a race condition in the functions tcp_getsockopt/tcp_setsockopt. The manipulation leads to a race condition (bsc#1204405).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() (git-fixes).\n- ACPI: HMAT: Fix initiator registration for single-initiator systems (git-fixes).\n- ACPI: HMAT: remove unnecessary variable initialization (git-fixes).\n- ACPI: scan: Add LATT2021 to acpi_ignore_dep_ids[] (git-fixes).\n- ACPI: x86: Add another system to quirk list for forcing StorageD3Enable (git-fixes).\n- ALSA: dice: fix regression for Lexicon I-ONIX FW810S (git-fixes).\n- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).\n- ALSA: hda/hdmi - enable runtime pm for more AMD display audio (git-fixes).\n- ALSA: hda/realtek: Add Positivo C6300 model quirk (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (git-fixes).\n- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (bsc#1205100).\n- ALSA: hda/realtek: fix speakers for Samsung Galaxy Book Pro (bsc#1205100).\n- ALSA: hda: fix potential memleak in \u0027add_widget_node\u0027 (git-fixes).\n- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).\n- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).\n- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).\n- ALSA: usb-audio: Remove redundant workaround for Roland quirk (bsc#1205111).\n- ALSA: usb-audio: Yet more regression for for the delayed card registration (bsc#1205111).\n- ALSA: usb-audio: add quirk to fix Hamedal C20 disconnect issue (git-fixes).\n- ARM: at91: rm9200: fix usb device clock id (git-fixes).\n- ARM: dts: am335x-pcm-953: Define fixed regulators in root node (git-fixes).\n- ARM: dts: at91: sam9g20ek: enable udc vbus gpio pinctrl (git-fixes).\n- ARM: dts: imx6q-prti6q: Fix ref/tcxo-clock-frequency properties (git-fixes).\n- ARM: dts: imx6qdl-gw59{10,13}: fix user pushbutton GPIO offset (git-fixes).\n- ARM: dts: imx7: Fix NAND controller size-cells (git-fixes).\n- ARM: mxs: fix memory leak in mxs_machine_init() (git-fixes).\n- ASoC: Intel: bytcht_es8316: Add quirk for the Nanote UMPC-01 (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk variant for LAPBC710 NUC15 (git-fixes).\n- ASoC: codecs: jz4725b: Fix spelling mistake \u0027Sourc\u0027 -\u003e \u0027Source\u0027, \u0027Routee\u0027 -\u003e \u0027Route\u0027 (git-fixes).\n- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).\n- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).\n- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).\n- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).\n- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).\n- ASoC: fsl_asrc fsl_esai fsl_sai: allow CONFIG_PM=N (git-fixes).\n- ASoC: fsl_sai: use local device pointer (git-fixes).\n- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).\n- ASoC: mt6660: Keep the pm_runtime enables before component stuff in mt6660_i2c_probe (git-fixes).\n- ASoC: ops: Fix bounds check for _sx controls (git-fixes).\n- ASoC: rt1019: Fix the TDM settings (git-fixes).\n- ASoC: sgtl5000: Reset the CHIP_CLK_CTRL reg on remove (git-fixes).\n- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).\n- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).\n- ASoC: stm32: dfsdm: manage cb buffers cleanup (git-fixes).\n- ASoC: tas2764: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).\n- Bluetooth: 6LoWPAN: add missing hci_dev_put() in get_l2cap_conn() (git-fixes).\n- Bluetooth: Fix not cleanup led when bt_init fails (git-fixes).\n- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (git-fixes).\n- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).\n- Decrease the number of SMB3 smbdirect client SGEs (bsc#1193629).\n- Drivers: hv: Always reserve framebuffer region for Gen1 VMs (git-fixes).\n- Drivers: hv: Fix syntax errors in comments (git-fixes).\n- Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region (git-fixes).\n- Drivers: hv: fix repeated words in comments (git-fixes).\n- Drivers: hv: remove duplicate word in a comment (git-fixes).\n- Drivers: hv: vmbus: Accept hv_sock offers in isolated guests (git-fixes).\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Do not wait for the ACPI device upon initialization (git-fixes).\n- Drivers: hv: vmbus: Fix kernel-doc (git-fixes).\n- Drivers: hv: vmbus: Optimize vmbus_on_event (git-fixes).\n- Drivers: hv: vmbus: Release cpu lock in error case (git-fixes).\n- Drivers: hv: vmbus: Use PCI_VENDOR_ID_MICROSOFT for better discoverability (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: fix typo in comment (git-fixes).\n- Fix formatting of client smbdirect RDMA logging (bsc#1193629).\n- HID: core: fix shift-out-of-bounds in hid_report_raw_event (git-fixes).\n- HID: hid-lg4ff: Add check for empty lbuf (git-fixes).\n- HID: hyperv: fix possible memory leak in mousevsc_probe() (git-fixes).\n- HID: playstation: add initial DualSense Edge controller support (git-fixes).\n- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).\n- Handle variable number of SGEs in client smbdirect send (bsc#1193629).\n- IB/hfi1: Correctly move list in sc_disable() (git-fixes)\n- IB: Set IOVA/LENGTH on IB_MR in core/uverbs layers (git-fixes)\n- Input: goodix - try resetting the controller when no config is set (git-fixes).\n- Input: i8042 - fix leaking of platform device on module removal (git-fixes).\n- Input: iforce - invert valid length check when fetching device IDs (git-fixes).\n- Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() (git-fixes).\n- Input: soc_button_array - add Acer Switch V 10 to dmi_use_low_level_irq[] (git-fixes).\n- Input: soc_button_array - add use_low_level_irq module parameter (git-fixes).\n- Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode (git-fixes).\n- KVM: Move wiping of the kvm-\u003evcpus array to common code (git-fixes).\n- KVM: SEV: Mark nested locking of vcpu-\u003elock (git-fixes).\n- KVM: SVM: Disable SEV-ES support if MMIO caching is disable (git-fixes).\n- KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is supported (git-fixes).\n- KVM: SVM: adjust register allocation for __svm_vcpu_run() (git-fixes).\n- KVM: SVM: move guest vmsave/vmload back to assembly (git-fixes).\n- KVM: SVM: replace regs argument of __svm_vcpu_run() with vcpu_svm (git-fixes).\n- KVM: SVM: retrieve VMCB from assembly (git-fixes).\n- KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL (git-fixes).\n- KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS (git-fixes).\n- KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there\u0027s no vPMU (git-fixes).\n- KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled (bsc#1205007).\n- KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable (git-fixes).\n- KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1 (git-fixes).\n- KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists (git-fixes).\n- KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}() (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes jsc#PED-611).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes jsc#PED-611).\n- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).\n- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).\n- KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap (git-fixes).\n- KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non-atomic path (git-fixes).\n- KVM: x86/mmu: fix memoryleak in kvm_mmu_vendor_module_init() (git-fixes).\n- KVM: x86/pmu: Fix and isolate TSX-specific performance event logic (git-fixes).\n- KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog (git-fixes).\n- KVM: x86/pmu: Use different raw event masks for AMD and Intel (git-fixes).\n- KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id (git-fixes).\n- KVM: x86: Fully initialize \u0027struct kvm_lapic_irq\u0027 in kvm_pv_kick_cpu_op() (git-fixes).\n- KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000001H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000006H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000008H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.8000001AH (git-fixes).\n- KVM: x86: Report error when setting CPUID if Hyper-V allocation fails (git-fixes).\n- KVM: x86: Retry page fault if MMU reload is pending and root has no sp (bsc#1205744).\n- KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS) (git-fixes).\n- KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1) (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits (git-fixes).\n- KVM: x86: avoid loading a vCPU after .vm_destroy was called (git-fixes).\n- KVM: x86: emulator: em_sysexit should update ctxt-\u003emode (git-fixes).\n- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).\n- KVM: x86: emulator: update the emulation mode after CR0 write (git-fixes).\n- KVM: x86: emulator: update the emulation mode after rsm (git-fixes).\n- KVM: x86: use a separate asm-offsets.c file (git-fixes).\n- MIPS: Loongson: Use hwmon_device_register_with_groups() to register hwmon (git-fixes).\n- NFC: nci: Bounds check struct nfc_target arrays (git-fixes).\n- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).\n- PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h (git-fixes).\n- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (git-fixes).\n- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)\n- RDMA/cm: Use SLID in the work completion as the DLID in responder side (git-fixes)\n- RDMA/cma: Use output interface for net_dev check (git-fixes)\n- RDMA/core: Fix null-ptr-deref in ib_core_cleanup() (git-fixes)\n- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)\n- RDMA/hfi1: Prevent use of lock before it is initialized (git-fixes)\n- RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (git-fixes)\n- RDMA/hns: Correct the type of variables participating in the shift operation (git-fixes)\n- RDMA/hns: Disable local invalidate operation (git-fixes)\n- RDMA/hns: Fix incorrect clearing of interrupt status register (git-fixes)\n- RDMA/hns: Fix supported page size (git-fixes)\n- RDMA/hns: Fix wrong fixed value of qp-\u003erq.wqe_shift (git-fixes)\n- RDMA/hns: Remove magic number (git-fixes)\n- RDMA/hns: Remove the num_cqc_timer variable (git-fixes)\n- RDMA/hns: Remove the num_qpc_timer variable (git-fixes)\n- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)\n- RDMA/hns: Replace tab with space in the right-side comments (git-fixes)\n- RDMA/hns: Use hr_reg_xxx() instead of remaining roce_set_xxx() (git-fixes)\n- RDMA/irdma: Fix deadlock in irdma_cleanup_cm_core() (git-fixes)\n- RDMA/irdma: Use s/g array in post send only when its valid (git-fixes)\n- RDMA/mlx5: Set local port to one when accessing counters (git-fixes)\n- RDMA/qedr: clean up work queue on failure in qedr_alloc_resources() (git-fixes)\n- RDMA/rtrs-clt: Use the right sg_cnt after ib_dma_map_sg (git-fixes)\n- RDMA/rtrs-srv: Fix modinfo output for stringify (git-fixes)\n- RDMA/rxe: Limit the number of calls to each tasklet (git-fixes)\n- RDMA/rxe: Remove useless pkt parameters (git-fixes)\n- Reduce client smbdirect max receive segment size (bsc#1193629).\n- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).\n- SMB3: fix lease break timeout when multiple deferred close handles for the same file (bsc#1193629).\n- USB: bcma: Make GPIO explicitly optional (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID (git-fixes).\n- arcnet: fix potential memory leak in com20020_probe() (git-fixes).\n- arm64/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).\n- arm64: Add AMPERE1 to the Spectre-BHB affected list (git-fixes).\n- arm64: Fix bit-shifting UB in the MIDR_CPU_MODEL() macro (git-fixes)\n- arm64: dts: imx8: correct clock order (git-fixes).\n- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mn: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: juno: Add thermal critical trip points (git-fixes).\n- arm64: dts: ls1088a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: ls208xa: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: lx2160a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: qcom: sa8155p-adp: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8150-xperia-kumano: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250-xperia-edo: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8350-hdk: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: rockchip: add enable-strobe-pulldown to emmc phy on nanopi4 (git-fixes).\n- arm64: dts: rockchip: lower rk3399-puma-haikou SD controller clock frequency (git-fixes).\n- arm64: efi: Fix handling of misaligned runtime regions and drop warning (git-fixes).\n- arm64: entry: avoid kprobe recursion (git-fixes).\n- arm64: errata: Add Cortex-A55 to the repeat tlbi list (git-fixes). Enable CONFIG_ARM64_ERRATUM_2441007, too\n- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes) Enable CONFIG_ARM64_ERRATUM_1742098 in arm64/default\n- arm64: fix rodata=full again (git-fixes)\n- ata: libata-core: do not issue non-internal commands once EH is pending (git-fixes).\n- ata: libata-scsi: fix SYNCHRONIZE CACHE (16) command failure (git-fixes).\n- ata: libata-scsi: simplify __ata_scsi_queuecmd() (git-fixes).\n- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).\n- audit: fix undefined behavior in bit shift for AUDIT_BIT (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (git-fixes).\n- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).\n- blk-mq: do not create hctx debugfs dir until q-\u003edebugfs_dir is created (git-fixes).\n- blk-mq: fix io hung due to missing commit_rqs (git-fixes).\n- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block/rnbd-srv: Set keep_id to true after mutex_trylock (git-fixes).\n- block: add bio_start_io_acct_time() to control start_time (git-fixes).\n- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).\n- block: drop unused includes in \u0026lt;linux/genhd.h\u003e (git-fixes).\n- bridge: switchdev: Fix memory leaks when changing VLAN protocol (git-fixes).\n- btrfs: check if root is readonly while setting security xattr (bsc#1206147).\n- btrfs: do not allow compression on nodatacow files (bsc#1206149).\n- btrfs: export a helper for compression hard check (bsc#1206149).\n- btrfs: fix processing of delayed data refs during backref walking (bsc#1206056).\n- btrfs: fix processing of delayed tree block refs during backref walking (bsc#1206057).\n- btrfs: prevent subvol with swapfile from being deleted (bsc#1206035).\n- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1206036).\n- btrfs: send: fix failures when processing inodes with no links (bsc#1206036).\n- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1206036).\n- btrfs: send: fix sending link commands for existing file paths (bsc#1206036).\n- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1206036).\n- btrfs: send: refactor arguments of get_inode_info() (bsc#1206036).\n- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1206036).\n- btrfs: send: remove unused type parameter to iterate_inode_ref_t (bsc#1206036).\n- btrfs: send: use boolean types for current inode status (bsc#1206036).\n- bus: sunxi-rsb: Remove the shutdown callback (git-fixes).\n- bus: sunxi-rsb: Support atomic transfers (git-fixes).\n- ca8210: Fix crash by zero initializing data (git-fixes).\n- can: af_can: fix NULL pointer dereference in can_rx_register() (git-fixes).\n- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).\n- can: etas_es58x: es58x_init_netdev(): free netdev when register_candev() (git-fixes).\n- can: j1939: j1939_send_one(): fix missing CAN header initialization (git-fixes).\n- can: m_can: Add check for devm_clk_get (git-fixes).\n- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (git-fixes).\n- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).\n- capabilities: fix potential memleak on error path from vfs_getxattr_alloc() (git-fixes).\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).\n- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1206050).\n- ceph: avoid putting the realm twice when decoding snaps fails (bsc#1206051).\n- ceph: do not update snapshot context when there is no new snapshot (bsc#1206047).\n- ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1206048).\n- ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1206049).\n- ceph: properly handle statfs on multifs setups (bsc#1206045).\n- ceph: switch netfs read ops to use rreq-\u003einode instead of rreq-\u003emapping-\u003ehost (bsc#1206046).\n- char: tpm: Protect tpm_pm_suspend with locks (git-fixes).\n- cifs: Add constructor/destructors for tcon-\u003ecfid (bsc#1193629).\n- cifs: Add helper function to check smb1+ server (bsc#1193629).\n- cifs: Do not access tcon-\u003ecfids-\u003ecfid directly from is_path_accessible (bsc#1193629).\n- cifs: Do not use tcon-\u003ecfid directly, use the cfid we get from open_cached_dir (bsc#1193629).\n- cifs: Fix connections leak when tlink setup failed (git-fixes).\n- cifs: Fix memory leak on the deferred close (bsc#1193629).\n- cifs: Fix memory leak when build ntlmssp negotiate blob failed (bsc#1193629).\n- cifs: Fix pages array leak when writedata alloc failed in cifs_writedata_alloc() (bsc#1193629).\n- cifs: Fix pages leak when writedata alloc failed in cifs_write_from_iter() (bsc#1193629).\n- cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message (bsc#1193629).\n- cifs: Fix wrong return value checking when GETFLAGS (git-fixes).\n- cifs: Fix xid leak in cifs_copy_file_range() (bsc#1193629).\n- cifs: Fix xid leak in cifs_create() (bsc#1193629).\n- cifs: Fix xid leak in cifs_flock() (bsc#1193629).\n- cifs: Fix xid leak in cifs_get_file_info_unix() (bsc#1193629).\n- cifs: Fix xid leak in cifs_ses_add_channel() (bsc#1193629).\n- cifs: Make tcon contain a wrapper structure cached_fids instead of cached_fid (bsc#1193629).\n- cifs: Move cached-dir functions into a separate file (bsc#1193629).\n- cifs: Replace a couple of one-element arrays with flexible-array members (bsc#1193629).\n- cifs: Use after free in debug code (git-fixes).\n- cifs: Use help macro to get the header preamble size (bsc#1193629).\n- cifs: Use help macro to get the mid header size (bsc#1193629).\n- cifs: add check for returning value of SMB2_close_init (git-fixes).\n- cifs: add check for returning value of SMB2_set_info_init (git-fixes).\n- cifs: add missing spinlock around tcon refcount (bsc#1193629).\n- cifs: alloc_mid function should be marked as static (bsc#1193629).\n- cifs: always initialize struct msghdr smb_msg completely (bsc#1193629).\n- cifs: always iterate smb sessions using primary channel (bsc#1193629).\n- cifs: avoid deadlocks while updating iface (bsc#1193629).\n- cifs: avoid unnecessary iteration of tcp sessions (bsc#1193629).\n- cifs: avoid use of global locks for high contention data (bsc#1193629).\n- cifs: cache the dirents for entries in a cached directory (bsc#1193629).\n- cifs: change iface_list from array to sorted linked list (bsc#1193629).\n- cifs: destage dirty pages before re-reading them for cache=none (bsc#1193629).\n- cifs: do not send down the destination address to sendmsg for a SOCK_STREAM (bsc#1193629).\n- cifs: drop the lease for cached directories on rmdir or rename (bsc#1193629).\n- cifs: during reconnect, update interface if necessary (bsc#1193629).\n- cifs: enable caching of directories for which a lease is held (bsc#1193629).\n- cifs: find and use the dentry for cached non-root directories also (bsc#1193629).\n- cifs: fix double-fault crash during ntlmssp (bsc#1193629).\n- cifs: fix lock length calculation (bsc#1193629).\n- cifs: fix memory leaks in session setup (bsc#1193629).\n- cifs: fix missing unlock in cifs_file_copychunk_range() (git-fixes).\n- cifs: fix race condition with delayed threads (bsc#1193629).\n- cifs: fix skipping to incorrect offset in emit_cached_dirents (bsc#1193629).\n- cifs: fix small mempool leak in SMB2_negotiate() (bsc#1193629).\n- cifs: fix static checker warning (bsc#1193629).\n- cifs: fix uninitialised var in smb2_compound_op() (bsc#1193629).\n- cifs: fix use-after-free caused by invalid pointer `hostname` (bsc#1193629).\n- cifs: fix use-after-free on the link name (bsc#1193629).\n- cifs: fix wrong unlock before return from cifs_tree_connect() (bsc#1193629).\n- cifs: improve handlecaching (bsc#1193629).\n- cifs: improve symlink handling for smb2+ (bsc#1193629).\n- cifs: lease key is uninitialized in smb1 paths (bsc#1193629).\n- cifs: lease key is uninitialized in two additional functions when smb1 (bsc#1193629).\n- cifs: list_for_each() -\u003e list_for_each_entry() (bsc#1193629).\n- cifs: misc: fix spelling typo in comment (bsc#1193629).\n- cifs: move from strlcpy with unused retval to strscpy (bsc#1193629).\n- cifs: periodically query network interfaces from server (bsc#1193629).\n- cifs: populate empty hostnames for extra channels (bsc#1193629).\n- cifs: prevent copying past input buffer boundaries (bsc#1193629).\n- cifs: remove \u0027cifs_\u0027 prefix from init/destroy mids functions (bsc#1193629).\n- cifs: remove initialization value (bsc#1193629).\n- cifs: remove minor build warning (bsc#1193629).\n- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1193629).\n- cifs: remove remaining build warnings (bsc#1193629).\n- cifs: remove some camelCase and also some static build warnings (bsc#1193629).\n- cifs: remove unnecessary (void*) conversions (bsc#1193629).\n- cifs: remove unnecessary locking of chan_lock while freeing session (bsc#1193629).\n- cifs: remove unnecessary type castings (bsc#1193629).\n- cifs: remove unused server parameter from calc_smb_size() (bsc#1193629).\n- cifs: remove useless DeleteMidQEntry() (bsc#1193629).\n- cifs: remove useless parameter \u0027is_fsctl\u0027 from SMB2_ioctl() (bsc#1193629).\n- cifs: replace kfree() with kfree_sensitive() for sensitive data (bsc#1193629).\n- cifs: return correct error in -\u003ecalc_signature() (bsc#1193629).\n- cifs: return errors during session setup during reconnects (bsc#1193629).\n- cifs: revalidate mapping when doing direct writes (bsc#1193629).\n- cifs: secmech: use shash_desc directly, remove sdesc (bsc#1193629).\n- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir (bsc#1193629).\n- cifs: skip extra NULL byte in filenames (bsc#1193629).\n- cifs: store a pointer to a fid in the cfid structure instead of the struct (bsc#1193629).\n- cifs: truncate the inode and mapping when we simulate fcollapse (bsc#1193629).\n- cifs: update cifs_ses::ip_addr after failover (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: use ALIGN() and round_up() macros (bsc#1193629).\n- cifs: use LIST_HEAD() and list_move() to simplify code (bsc#1193629).\n- cifs: when a channel is not found for server, log its connection id (bsc#1193629).\n- cifs: when insecure legacy is disabled shrink amount of SMB1 code (bsc#1193629).\n- clocksource/drivers/hyperv: add data structure for reference TSC MSR (git-fixes).\n- cpufreq: intel_pstate: Handle no_turbo in frequency invariance (jsc#PED-849).\n- cpufreq: intel_pstate: Support Sapphire Rapids OOB mode (jsc#PED-849).\n- cpuidle: intel_idle: Drop redundant backslash at line end (jsc#PED-1936).\n- dm btree remove: fix use after free in rebalance_children() (git-fixes).\n- dm crypt: make printing of the key constant-time (git-fixes).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm integrity: fix memory corruption when tag_size is less than digest size (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm stats: add cond_resched when looping over entries (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm: fix double accounting of flush with data (git-fixes).\n- dm: interlock pending dm_io and dm_wait_for_bios_completion (git-fixes).\n- dm: properly fix redundant bio-based IO accounting (git-fixes).\n- dm: remove unnecessary assignment statement in alloc_dev() (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- dm: revert partial fix for redundant bio-based IO accounting (git-fixes).\n- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).\n- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).\n- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).\n- dmaengine: at_hdmac: Do not call the complete callback on device_terminate_all (git-fixes).\n- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).\n- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).\n- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over descriptor (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over the active list (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency problems by removing atc_complete_all() (git-fixes).\n- dmaengine: at_hdmac: Fix descriptor handling when issuing it to hardware (git-fixes).\n- dmaengine: at_hdmac: Fix impossible condition (git-fixes).\n- dmaengine: at_hdmac: Fix premature completion of desc in issue_pending (git-fixes).\n- dmaengine: at_hdmac: Free the memset buf without holding the chan lock (git-fixes).\n- dmaengine: at_hdmac: Protect atchan-\u003estatus with the channel lock (git-fixes).\n- dmaengine: at_hdmac: Start transfer for cyclic channels in issue_pending (git-fixes).\n- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).\n- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).\n- dmaengine: ti: k3-udma-glue: fix memory leak when register device fail (git-fixes).\n- docs, kprobes: Fix the wrong location of Kprobes (git-fixes).\n- docs/core-api: expand Fedora instructions for GCC plugins (git-fixes).\n- drm/amd/display: Add HUBP surface flip interrupt handler (git-fixes).\n- drm/amdgpu: disable BACO on special BEIGE_GOBY card (git-fixes).\n- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() (git-fixes).\n- drm/amdkfd: Migrate in CPU page fault use current mm (git-fixes).\n- drm/amdkfd: avoid recursive lock in migrations back to RAM (git-fixes).\n- drm/amdkfd: handle CPU fault on COW mapping (git-fixes).\n- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).\n- drm/hyperv: Add ratelimit on error message (git-fixes).\n- drm/hyperv: Do not overwrite dirt_needed value set by host (git-fixes).\n- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).\n- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).\n- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).\n- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).\n- drm/msm/hdmi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/hdmi: fix IRQ lifetime (git-fixes).\n- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).\n- drm/rockchip: dsi: Force synchronous probe (git-fixes).\n- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).\n- drm/vc4: kms: Fix IS_ERR() vs NULL check for vc4_kms (git-fixes).\n- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).\n- dt-bindings: power: gpcv2: add power-domains property (git-fixes).\n- e1000e: Fix TX dispatch condition (git-fixes).\n- e100: Fix possible use after free in e100_xmit_prepare (git-fixes).\n- efi/tpm: Pass correct address to memblock_reserve (git-fixes).\n- efi: random: Use \u0027ACPI reclaim\u0027 memory for random seed (git-fixes).\n- efi: random: reduce seed size to 32 bytes (git-fixes).\n- firmware: arm_scmi: Make Rx chan_setup fail on memory errors (git-fixes).\n- firmware: arm_scmi: Suppress the driver\u0027s bind attributes (git-fixes).\n- firmware: coreboot: Register bus in module init (git-fixes).\n- fm10k: Fix error handling in fm10k_init_module() (git-fixes).\n- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- fuse: add file_modified() to fallocate (bsc#1205332).\n- fuse: fix readdir cache race (bsc#1205331).\n- gpio: amd8111: Fix PCI device reference count leak (git-fixes).\n- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).\n- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).\n- hv_sock: Add validation for untrusted Hyper-V values (git-fixes).\n- hv_sock: Check hv_pkt_iter_first_raw()\u0027s return value (git-fixes).\n- hv_sock: Copy packets sent by Hyper-V out of the ring buffer (git-fixes).\n- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).\n- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).\n- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).\n- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).\n- hwmon: (ina3221) Fix shunt sum critical calculation (git-fixes).\n- hwmon: (ltc2947) fix temperature scaling (git-fixes).\n- i2c: i801: add lis3lv02d\u0027s I2C address for Vostro 5568 (git-fixes).\n- i2c: imx: Only DMA messages with I2C_M_DMA_SAFE flag set (git-fixes).\n- i2c: npcm7xx: Fix error handling in npcm_i2c_init() (git-fixes).\n- i2c: piix4: Fix adapter not be removed in piix4_remove() (git-fixes).\n- i2c: tegra: Allocate DMA memory for DMA engine (git-fixes).\n- i2c: xiic: Add platform module alias (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- ieee802154: cc2520: Fix error return code in cc2520_hw_init() (git-fixes).\n- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).\n- iio: adc: mp2629: fix potential array out of bound access (git-fixes).\n- iio: adc: mp2629: fix wrong comparison of channel (git-fixes).\n- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).\n- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).\n- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).\n- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).\n- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).\n- iio: ms5611: Simplify IO callback parameters (git-fixes).\n- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).\n- iio: pressure: ms5611: fixed value compensation bug (git-fixes).\n- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).\n- init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash (git-fixes).\n- intel_idle: Add AlderLake support (jsc#PED-824).\n- intel_idle: Fix SPR C6 optimization (jsc#PED-824 jsc#PED-1936).\n- intel_idle: Fix the \u0027preferred_cstates\u0027 module parameter (jsc#PED-824 jsc#PED-1936).\n- intel_idle: make SPR C1 and C1E be independent (jsc#PED-1936).\n- io-wq: Remove duplicate code in io_workqueue_create() (bnc#1205113).\n- io-wq: do not retry task_work creation failure on fatal conditions (bnc#1205113).\n- io-wq: ensure we exit if thread group is exiting (git-fixes).\n- io-wq: exclusively gate signal based exit on get_signal() return (git-fixes).\n- io-wq: fix cancellation on create-worker failure (bnc#1205113).\n- io-wq: fix silly logic error in io_task_work_match() (bnc#1205113).\n- io_uring: correct __must_hold annotation (git-fixes).\n- io_uring: drop ctx-\u003euring_lock before acquiring sqd-\u003elock (git-fixes).\n- io_uring: ensure IORING_REGISTER_IOWQ_MAX_WORKERS works with SQPOLL (git-fixes).\n- io_uring: fix io_timeout_remove locking (git-fixes).\n- io_uring: fix missing mb() before waitqueue_active (git-fixes).\n- io_uring: fix missing sigmask restore in io_cqring_wait() (git-fixes).\n- io_uring: fix possible poll event lost in multi shot mode (git-fixes).\n- io_uring: pin SQPOLL data before unlocking ring lock (git-fixes).\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- kABI: Fix kABI after \u0027KVM: x86/pmu: Use different raw event masks for AMD and Intel\u0027 (git-fixes).\n- kbuild: Unify options for BTF generation for vmlinux and modules (bsc#1204693).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).\n- mac80211: radiotap: Use BIT() instead of shifts (git-fixes).\n- mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (git-fixes).\n- macsec: Fix invalid error code set (git-fixes).\n- macsec: add missing attribute validation for offload (git-fixes).\n- macsec: clear encryption keys from the stack after setting up offload (git-fixes).\n- macsec: delete new rxsc when offload fails (git-fixes).\n- macsec: fix detection of RXSCs when toggling offloading (git-fixes).\n- macsec: fix secy-\u003en_rx_sc accounting (git-fixes).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).\n- media: cros-ec-cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).\n- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).\n- media: rkisp1: Do not pass the quantization to rkisp1_csm_config() (git-fixes).\n- media: rkisp1: Initialize color space on resizer sink and source pads (git-fixes).\n- media: rkisp1: Use correct macro for gradient registers (git-fixes).\n- media: rkisp1: Zero v4l2_subdev_format fields in when validating links (git-fixes).\n- media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: v4l: subdev: Fail graciously when getting try data for NULL state (git-fixes).\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).\n- mmc: core: Fix ambiguous TRIM and DISCARD arg (git-fixes).\n- mmc: core: properly select voltage range without power cycle (git-fixes).\n- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).\n- mmc: mmc_test: Fix removal of debugfs file (git-fixes).\n- mmc: sdhci-brcmstb: Enable Clock Gating to save power (git-fixes).\n- mmc: sdhci-brcmstb: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-brcmstb: Re-organize flags (git-fixes).\n- mmc: sdhci-esdhc-imx: correct CQHCI exit halt state check (git-fixes).\n- mmc: sdhci-esdhc-imx: use the correct host caps for MMC_CAP_8_BIT_DATA (git-fixes).\n- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).\n- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).\n- mmc: sdhci-sprd: Fix no reset data and command after voltage switch (git-fixes).\n- mmc: sdhci-tegra: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci_am654: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mms: sdhci-esdhc-imx: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mtd: parsers: bcm47xxpart: Fix halfblock reads (git-fixes).\n- mtd: parsers: bcm47xxpart: print correct offset on read error (git-fixes).\n- mtd: spi-nor: intel-spi: Disable write protection only if asked (git-fixes).\n- nbd: Fix incorrect error handle when first_minor is illegal in nbd_dev_add (git-fixes).\n- net/smc: Avoid overwriting the copies of clcsock callback functions (git-fixes).\n- net/smc: Fix an error code in smc_lgr_create() (git-fixes).\n- net/smc: Fix possible access to freed memory in link clear (git-fixes).\n- net/smc: Fix possible leaked pernet namespace in smc_init() (git-fixes).\n- net/smc: Fix slab-out-of-bounds issue in fallback (git-fixes).\n- net/smc: Fix sock leak when release after smc_shutdown() (git-fixes).\n- net/smc: Forward wakeup to smc socket waitqueue after fallback (git-fixes).\n- net/smc: Only save the original clcsock callback functions (git-fixes).\n- net/smc: Send directly when TCP_CORK is cleared (git-fixes).\n- net/smc: kABI workarounds for struct smc_link (git-fixes).\n- net/smc: kABI workarounds for struct smc_sock (git-fixes).\n- net/smc: send directly on setting TCP_NODELAY (git-fixes).\n- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).\n- net: ethernet: nixge: fix NULL dereference (git-fixes).\n- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).\n- net: ethernet: ti: am65-cpsw: fix error handling in am65_cpsw_nuss_probe() (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: mdio: fix unbalanced fwnode reference count in mdio_device_release() (git-fixes).\n- net: mdiobus: fix unbalanced node reference count (git-fixes).\n- net: phy: fix null-ptr-deref while probe() failed (git-fixes).\n- net: phy: marvell: add sleep time after enabling the loopback bit (git-fixes).\n- net: phy: mscc: macsec: clear encryption keys when freeing a flow (git-fixes).\n- net: smsc95xx: add support for Microchip EVB-LAN8670-USB (git-fixes).\n- net: stmmac: work around sporadic tx issue on link-up (git-fixes).\n- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).\n- net: thunderbolt: fix memory leak in tbnet_open() (git-fixes).\n- net: thunderx: Fix the ACPI memory leak (git-fixes).\n- net: usb: qmi_wwan: add Telit 0x103a composition (git-fixes).\n- net: wwan: iosm: fix dma_alloc_coherent incompatible pointer type (git-fixes).\n- net: wwan: iosm: fix kernel test robot reported error (git-fixes).\n- nfc/nci: fix race with opening and closing (git-fixes).\n- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).\n- nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() (git-fixes).\n- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).\n- nfc: st-nci: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).\n- nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() (git-fixes).\n- nilfs2: fix deadlock in nilfs_count_free_blocks() (git-fixes).\n- nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty (git-fixes).\n- nilfs2: fix use-after-free bug of ns_writer on remount (git-fixes).\n- nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure (git-fixes).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- parport_pc: Avoid FIFO port location truncation (git-fixes).\n- phy: ralink: mt7621-pci: add sentinel to quirks table (git-fixes).\n- phy: stm32: fix an error code in probe (git-fixes).\n- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).\n- pinctrl: intel: Save and restore pins in \u0027direct IRQ\u0027 mode (git-fixes).\n- pinctrl: rockchip: list all pins in a possible mux route for PX30 (git-fixes).\n- pinctrl: single: Fix potential division by zero (git-fixes).\n- platform/surface: aggregator: Do not check for repeated unsequenced packets (git-fixes).\n- platform/x86/intel/pmt: Sapphire Rapids PMT errata fix (jsc#PED-2684 bsc#1205683).\n- platform/x86/intel: hid: add quirk to support Surface Go 3 (git-fixes).\n- platform/x86/intel: pmc: Do not unconditionally attach Intel PMC when virtualized (git-fixes).\n- platform/x86: acer-wmi: Enable SW_TABLET_MODE on Switch V 10 (SW5-017) (git-fixes).\n- platform/x86: asus-wmi: add missing pci_dev_put() in asus_wmi_set_xusb2pr() (git-fixes).\n- platform/x86: hp-wmi: Ignore Smart Experience App event (git-fixes).\n- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).\n- platform/x86: ideapad-laptop: Disable touchpad_switch (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the RCA Cambio W101 v2 2-in-1 (git-fixes).\n- powerpc/64: Fix build failure with allyesconfig in book3s_64_entry.S (bsc#1194869).\n- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).\n- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).\n- powerpc/pseries/vas: Declare pseries_vas_fault_thread_fn() as static (bsc#1194869).\n- proc: avoid integer type confusion in get_proc_long (git-fixes).\n- proc: proc_skip_spaces() shouldn\u0027t think it is working on C strings (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- regulator: core: fix UAF in destroy_regulator() (git-fixes).\n- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).\n- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).\n- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205427 LTC#200502).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (bsc#1205427 LTC#200502).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).\n- s390: fix nospec table alignments (git-fixes).\n- sched: Clear ttwu_pending after enqueue_task() (git fixes (sched/core)).\n- sched: Disable sched domain debugfs creation on ppc64 unless sched_verbose is specified (bnc#1205653).\n- scripts/faddr2line: Fix regression in name resolution on ppc64le (git-fixes).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: megaraid_sas: Correct value passed to scsi_device_lookup() (git-fixes).\n- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).\n- scsi: qedf: Populate sysfs attributes for vport (git-fixes).\n- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix typo in comment (git-fixes).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: remove an extraneous \u0027to\u0027 in a comment (git-fixes).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- selftests/intel_pstate: fix build for ARCH=x86_64 (git-fixes).\n- selftests: mptcp: fix mibit vs mbit mix up (git-fixes).\n- selftests: mptcp: make sendfile selftest work (git-fixes).\n- selftests: mptcp: more stable simult_flows tests (git-fixes).\n- selftests: rtnetlink: correct xfrm policy rule in kci_test_ipsec_offload (git-fixes).\n- serial: 8250: 8250_omap: Avoid RS485 RTS glitch on -\u003eset_termios() (git-fixes).\n- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).\n- serial: 8250: Flush DMA Rx on RLSI (git-fixes).\n- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).\n- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).\n- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).\n- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).\n- serial: imx: Add missing .thaw_noirq hook (git-fixes).\n- siox: fix possible memory leak in siox_device_add() (git-fixes).\n- slimbus: stream: correct presence rate frequencies (git-fixes).\n- smb2: small refactor in smb2_check_message() (bsc#1193629).\n- smb3: Move the flush out of smb2_copychunk_range() into its callers (bsc#1193629).\n- smb3: add dynamic trace points for tree disconnect (bsc#1193629).\n- smb3: add trace point for SMB2_set_eof (bsc#1193629).\n- smb3: allow deferred close timeout to be configurable (bsc#1193629).\n- smb3: check xattr value length earlier (bsc#1193629).\n- smb3: clarify multichannel warning (bsc#1193629).\n- smb3: do not log confusing message when server returns no network interfaces (bsc#1193629).\n- smb3: fix empty netname context on secondary channels (bsc#1193629).\n- smb3: fix oops in calculating shash_setkey (bsc#1193629).\n- smb3: fix temporary data corruption in collapse range (bsc#1193629).\n- smb3: fix temporary data corruption in insert range (bsc#1193629).\n- smb3: improve SMB3 change notification support (bsc#1193629).\n- smb3: interface count displayed incorrectly (bsc#1193629).\n- smb3: missing inode locks in punch hole (bsc#1193629).\n- smb3: missing inode locks in zero range (bsc#1193629).\n- smb3: must initialize two ACL struct fields to zero (bsc#1193629).\n- smb3: remove unneeded null check in cifs_readdir (bsc#1193629).\n- smb3: rename encryption/decryption TFMs (bsc#1193629).\n- smb3: use filemap_write_and_wait_range instead of filemap_write_and_wait (bsc#1193629).\n- smb3: use netname when available on secondary channels (bsc#1193629).\n- smb3: workaround negprot bug in some Samba servers (bsc#1193629).\n- soc: imx8m: Enable OCOTP clock before reading the register (git-fixes).\n- soundwire: intel: Initialize clock stop timeout (bsc#1205507).\n- soundwire: qcom: check for outanding writes before doing a read (git-fixes).\n- soundwire: qcom: reinit broadcast completion (git-fixes).\n- speakup: fix a segfault caused by switching consoles (git-fixes).\n- spi: dw-dma: decrease reference count in dw_spi_dma_init_mfld() (git-fixes).\n- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).\n- spi: stm32: Print summary \u0027callbacks suppressed\u0027 message (git-fixes).\n- spi: stm32: fix stm32_spi_prepare_mbr() that halves spi clk for every run (git-fixes).\n- spi: tegra210-quad: Fix duplicate resource error (git-fixes).\n- thunderbolt: Add DP OUT resource when DP tunnel is discovered (git-fixes).\n- tools: hv: Remove an extraneous \u0027the\u0027 (git-fixes).\n- tools: hv: kvp: remove unnecessary (void*) conversions (git-fixes).\n- tools: iio: iio_generic_buffer: Fix read size (git-fixes).\n- tracing/ring-buffer: Have polling block on watermark (git-fixes).\n- tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() (git-fixes).\n- tracing: Fix memory leak in tracing_read_pipe() (git-fixes).\n- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).\n- tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit() (git-fixes).\n- tty: n_gsm: fix sleep-in-atomic-context bug in gsm_control_send (git-fixes).\n- tty: serial: fsl_lpuart: do not break the on-going transfer when global reset (git-fixes).\n- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- usb: cdns3: host: fix endless superspeed hub port reset (git-fixes).\n- usb: cdnsp: Fix issue with Clear Feature Halt Endpoint (git-fixes).\n- usb: cdnsp: fix issue with ZLP - added TD_SIZE = 1 (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).\n- usb: dwc3: gadget: Return -ESHUTDOWN on ep disable (git-fixes).\n- usb: dwc3: gadget: conditionally remove requests (git-fixes).\n- usb: smsc: use eth_hw_addr_set() (git-fixes).\n- usb: typec: mux: Enter safe mode only when pins need to be reconfigured (git-fixes).\n- usb: xhci-mtk: check boundary before check tt (git-fixes).\n- usb: xhci-mtk: update fs bus bandwidth by bw_budget_table (git-fixes).\n- usbnet: smsc95xx: Do not reset PHY behind PHY driver\u0027s back (git-fixes).\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027\n- video/fbdev/stifb: Implement the stifb_fillrect() function (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- vmxnet3: correctly report encapsulated LRO packet (git-fixes).\n- vmxnet3: use correct intrConf reference when using extended queues (git-fixes).\n- wifi: airo: do not assign -1 to unsigned char (git-fixes).\n- wifi: ath11k: Fix QCN9074 firmware boot on x86 (git-fixes).\n- wifi: ath11k: avoid deadlock during regulatory update in ath11k_regd_update() (git-fixes).\n- wifi: cfg80211: do not allow multi-BSSID in S1G (git-fixes).\n- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).\n- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).\n- wifi: cfg80211: silence a sparse RCU warning (git-fixes).\n- wifi: mac80211: Fix ack frame idr leak when mesh has no route (git-fixes).\n- wifi: mac80211: fix memory free error when registering wiphy fail (git-fixes).\n- wifi: mac80211_hwsim: fix debugfs attribute ps with rc table support (git-fixes).\n- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).\n- wifi: wext: use flex array destination for memcpy() (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute (git-fixes).\n- wifi: wilc1000: validate number of channels (git-fixes).\n- wifi: wilc1000: validate pairwise and authentication suite offsets (git-fixes).\n- x86/Xen: streamline (and fix) PV CPU enumeration (git-fixes).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/entry: Work around Clang __bdos() bug (git-fixes).\n- x86/extable: Extend extable functionality (git-fixes).\n- x86/fpu: Drop fpregs lock before inheriting FPU permissions (bnc#1205282).\n- x86/futex: Remove .fixup usage (git-fixes).\n- x86/hyperv: Disable hardlockup detector by default in Hyper-V guests (git-fixes).\n- x86/hyperv: Fix \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: Update \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: fix invalid writes to MSRs during root partition kexec (git-fixes).\n- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/uaccess: Implement macros for CMPXCHG on user addresses (git-fixes).\n- xen/gntdev: Accommodate VMA splitting (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu\u003e=32 (git-fixes).\n- xfs: convert XLOG_FORCED_SHUTDOWN() to xlog_is_shutdown() (git-fixes).\n- xfs: fix perag reference leak on iteration race with growfs (git-fixes).\n- xfs: fix xfs_ifree() error handling to not leak perag ref (git-fixes).\n- xfs: reserve quota for dir expansion when linking/unlinking files (bsc#1205616).\n- xfs: reserve quota for target dir expansion when renaming files (bsc#1205679).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4585,SUSE-SLE-Micro-5.3-2022-4585,SUSE-SLE-Module-Basesystem-15-SP4-2022-4585,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4585,SUSE-SLE-Module-Legacy-15-SP4-2022-4585,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4585,SUSE-SLE-Product-HA-15-SP4-2022-4585,SUSE-SLE-Product-WE-15-SP4-2022-4585,openSUSE-Leap-Micro-5.3-2022-4585,openSUSE-SLE-15.4-2022-4585",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4585-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4585-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224585-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4585-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164051",
"url": "https://bugzilla.suse.com/1164051"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1189297",
"url": "https://bugzilla.suse.com/1189297"
},
{
"category": "self",
"summary": "SUSE Bug 1190256",
"url": "https://bugzilla.suse.com/1190256"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1202341",
"url": "https://bugzilla.suse.com/1202341"
},
{
"category": "self",
"summary": "SUSE Bug 1203183",
"url": "https://bugzilla.suse.com/1203183"
},
{
"category": "self",
"summary": "SUSE Bug 1203391",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "self",
"summary": "SUSE Bug 1203511",
"url": "https://bugzilla.suse.com/1203511"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1204228",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "self",
"summary": "SUSE Bug 1204405",
"url": "https://bugzilla.suse.com/1204405"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204693",
"url": "https://bugzilla.suse.com/1204693"
},
{
"category": "self",
"summary": "SUSE Bug 1204780",
"url": "https://bugzilla.suse.com/1204780"
},
{
"category": "self",
"summary": "SUSE Bug 1204810",
"url": "https://bugzilla.suse.com/1204810"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1205007",
"url": "https://bugzilla.suse.com/1205007"
},
{
"category": "self",
"summary": "SUSE Bug 1205100",
"url": "https://bugzilla.suse.com/1205100"
},
{
"category": "self",
"summary": "SUSE Bug 1205111",
"url": "https://bugzilla.suse.com/1205111"
},
{
"category": "self",
"summary": "SUSE Bug 1205113",
"url": "https://bugzilla.suse.com/1205113"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205149",
"url": "https://bugzilla.suse.com/1205149"
},
{
"category": "self",
"summary": "SUSE Bug 1205153",
"url": "https://bugzilla.suse.com/1205153"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205264",
"url": "https://bugzilla.suse.com/1205264"
},
{
"category": "self",
"summary": "SUSE Bug 1205282",
"url": "https://bugzilla.suse.com/1205282"
},
{
"category": "self",
"summary": "SUSE Bug 1205331",
"url": "https://bugzilla.suse.com/1205331"
},
{
"category": "self",
"summary": "SUSE Bug 1205332",
"url": "https://bugzilla.suse.com/1205332"
},
{
"category": "self",
"summary": "SUSE Bug 1205427",
"url": "https://bugzilla.suse.com/1205427"
},
{
"category": "self",
"summary": "SUSE Bug 1205428",
"url": "https://bugzilla.suse.com/1205428"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205507",
"url": "https://bugzilla.suse.com/1205507"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205521",
"url": "https://bugzilla.suse.com/1205521"
},
{
"category": "self",
"summary": "SUSE Bug 1205567",
"url": "https://bugzilla.suse.com/1205567"
},
{
"category": "self",
"summary": "SUSE Bug 1205616",
"url": "https://bugzilla.suse.com/1205616"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205653",
"url": "https://bugzilla.suse.com/1205653"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205679",
"url": "https://bugzilla.suse.com/1205679"
},
{
"category": "self",
"summary": "SUSE Bug 1205683",
"url": "https://bugzilla.suse.com/1205683"
},
{
"category": "self",
"summary": "SUSE Bug 1205700",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205711",
"url": "https://bugzilla.suse.com/1205711"
},
{
"category": "self",
"summary": "SUSE Bug 1205744",
"url": "https://bugzilla.suse.com/1205744"
},
{
"category": "self",
"summary": "SUSE Bug 1205764",
"url": "https://bugzilla.suse.com/1205764"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1205882",
"url": "https://bugzilla.suse.com/1205882"
},
{
"category": "self",
"summary": "SUSE Bug 1205993",
"url": "https://bugzilla.suse.com/1205993"
},
{
"category": "self",
"summary": "SUSE Bug 1206035",
"url": "https://bugzilla.suse.com/1206035"
},
{
"category": "self",
"summary": "SUSE Bug 1206036",
"url": "https://bugzilla.suse.com/1206036"
},
{
"category": "self",
"summary": "SUSE Bug 1206037",
"url": "https://bugzilla.suse.com/1206037"
},
{
"category": "self",
"summary": "SUSE Bug 1206045",
"url": "https://bugzilla.suse.com/1206045"
},
{
"category": "self",
"summary": "SUSE Bug 1206046",
"url": "https://bugzilla.suse.com/1206046"
},
{
"category": "self",
"summary": "SUSE Bug 1206047",
"url": "https://bugzilla.suse.com/1206047"
},
{
"category": "self",
"summary": "SUSE Bug 1206048",
"url": "https://bugzilla.suse.com/1206048"
},
{
"category": "self",
"summary": "SUSE Bug 1206049",
"url": "https://bugzilla.suse.com/1206049"
},
{
"category": "self",
"summary": "SUSE Bug 1206050",
"url": "https://bugzilla.suse.com/1206050"
},
{
"category": "self",
"summary": "SUSE Bug 1206051",
"url": "https://bugzilla.suse.com/1206051"
},
{
"category": "self",
"summary": "SUSE Bug 1206056",
"url": "https://bugzilla.suse.com/1206056"
},
{
"category": "self",
"summary": "SUSE Bug 1206057",
"url": "https://bugzilla.suse.com/1206057"
},
{
"category": "self",
"summary": "SUSE Bug 1206113",
"url": "https://bugzilla.suse.com/1206113"
},
{
"category": "self",
"summary": "SUSE Bug 1206114",
"url": "https://bugzilla.suse.com/1206114"
},
{
"category": "self",
"summary": "SUSE Bug 1206147",
"url": "https://bugzilla.suse.com/1206147"
},
{
"category": "self",
"summary": "SUSE Bug 1206149",
"url": "https://bugzilla.suse.com/1206149"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3176 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3566 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3707 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42328 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42329 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45869 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45888 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-20T11:52:38Z",
"generator": {
"date": "2022-12-20T11:52:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4585-1",
"initial_release_date": "2022-12-20T11:52:38Z",
"revision_history": [
{
"date": "2022-12-20T11:52:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product_id": "dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-allwinner-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-altera-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-altera-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-amazon-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-amd-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-amd-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-amlogic-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-apm-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-apm-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-apple-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-apple-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-arm-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-arm-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-broadcom-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-cavium-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-exynos-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-freescale-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-hisilicon-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-lg-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-lg-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-marvell-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-mediatek-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-nvidia-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-qcom-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-renesas-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-rockchip-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-socionext-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-sprd-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"product_id": "dtb-xilinx-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-64kb-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-default-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-default-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"product_id": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-default-devel-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-default-extra-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-default-optional-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-obs-build-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.38.1.aarch64",
"product_id": "kernel-syms-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.21-150400.24.38.1.noarch",
"product": {
"name": "kernel-devel-5.14.21-150400.24.38.1.noarch",
"product_id": "kernel-devel-5.14.21-150400.24.38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.14.21-150400.24.38.1.noarch",
"product": {
"name": "kernel-docs-5.14.21-150400.24.38.1.noarch",
"product_id": "kernel-docs-5.14.21-150400.24.38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"product": {
"name": "kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"product_id": "kernel-docs-html-5.14.21-150400.24.38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.21-150400.24.38.1.noarch",
"product": {
"name": "kernel-macros-5.14.21-150400.24.38.1.noarch",
"product_id": "kernel-macros-5.14.21-150400.24.38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.21-150400.24.38.1.noarch",
"product": {
"name": "kernel-source-5.14.21-150400.24.38.1.noarch",
"product_id": "kernel-source-5.14.21-150400.24.38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"product_id": "kernel-source-vanilla-5.14.21-150400.24.38.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product_id": "dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-debug-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-default-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-default-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"product_id": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-default-devel-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-default-extra-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-default-optional-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-obs-build-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kernel-syms-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"product_id": "dlm-kmp-default-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-default-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-default-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"product_id": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-default-devel-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-default-extra-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-default-optional-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-obs-build-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-obs-qa-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-syms-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-syms-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"product_id": "kernel-zfcpdump-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-debug-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-debug-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-debug-devel-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-default-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-default-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"product_id": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-default-devel-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-default-extra-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-default-optional-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-obs-build-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.38.1.x86_64",
"product_id": "kernel-syms-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.38.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.38.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.38.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.38.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.38.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-altera-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-amd-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-apm-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-apple-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-arm-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-lg-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-debug-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.38.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.38.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.14.21-150400.24.38.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.38.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.38.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.21-150400.24.38.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-3176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3176"
}
],
"notes": [
{
"category": "general",
"text": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn\u0027t handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3176",
"url": "https://www.suse.com/security/cve/CVE-2022-3176"
},
{
"category": "external",
"summary": "SUSE Bug 1203391 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "external",
"summary": "SUSE Bug 1203511 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "important"
}
],
"title": "CVE-2022-3176"
},
{
"cve": "CVE-2022-3566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3566"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3566",
"url": "https://www.suse.com/security/cve/CVE-2022-3566"
},
{
"category": "external",
"summary": "SUSE Bug 1204405 for CVE-2022-3566",
"url": "https://bugzilla.suse.com/1204405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3643"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3643",
"url": "https://www.suse.com/security/cve/CVE-2022-3643"
},
{
"category": "external",
"summary": "SUSE Bug 1206113 for CVE-2022-3643",
"url": "https://bugzilla.suse.com/1206113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-3707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3707"
}
],
"notes": [
{
"category": "general",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3707",
"url": "https://www.suse.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "SUSE Bug 1204780 for CVE-2022-3707",
"url": "https://bugzilla.suse.com/1204780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4129"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4129",
"url": "https://www.suse.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "SUSE Bug 1205711 for CVE-2022-4129",
"url": "https://bugzilla.suse.com/1205711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42328"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42328",
"url": "https://www.suse.com/security/cve/CVE-2022-42328"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42328",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42329"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42329",
"url": "https://www.suse.com/security/cve/CVE-2022-42329"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42329",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45869"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45869",
"url": "https://www.suse.com/security/cve/CVE-2022-45869"
},
{
"category": "external",
"summary": "SUSE Bug 1205882 for CVE-2022-45869",
"url": "https://bugzilla.suse.com/1205882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-45869"
},
{
"cve": "CVE-2022-45888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45888"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45888",
"url": "https://www.suse.com/security/cve/CVE-2022-45888"
},
{
"category": "external",
"summary": "SUSE Bug 1205764 for CVE-2022-45888",
"url": "https://bugzilla.suse.com/1205764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "low"
}
],
"title": "CVE-2022-45888"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_38-default-1-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.38.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.38.1.150400.24.13.2.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.38.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.38.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.38.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T11:52:38Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4561-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism (bsc#1177282).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bsc#1203322).\n- CVE-2022-41848: Fixed a race condition in drivers/char/pcmcia/synclink_cs.c mgslpc_ioctl and mgslpc_detach (bsc#1203987).\n\nThe following non-security bugs were fixed:\n\n- x86/build/64: Force the linker to use 2MB page size (bnc#1012382, bsc#1206091).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4561,SUSE-SLE-SERVER-12-SP2-BCL-2022-4561",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4561-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4561-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224561-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4561-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1129898",
"url": "https://bugzilla.suse.com/1129898"
},
{
"category": "self",
"summary": "SUSE Bug 1177282",
"url": "https://bugzilla.suse.com/1177282"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1198702",
"url": "https://bugzilla.suse.com/1198702"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202686",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203322",
"url": "https://bugzilla.suse.com/1203322"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE Bug 1204168",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "self",
"summary": "SUSE Bug 1204170",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204402",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204432",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204479",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204635",
"url": "https://bugzilla.suse.com/1204635"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1206091",
"url": "https://bugzilla.suse.com/1206091"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3874 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26541 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4037 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-19T12:23:28Z",
"generator": {
"date": "2022-12-19T12:23:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4561-1",
"initial_release_date": "2022-12-19T12:23:28Z",
"revision_history": [
{
"date": "2022-12-19T12:23:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.196.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.196.2.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.196.2.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.196.2.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.196.2.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.196.2.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.196.2.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.196.2.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.196.2.aarch64",
"product_id": "kernel-default-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.196.2.aarch64",
"product_id": "kernel-default-base-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.196.2.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.196.2.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.196.2.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.196.2.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.196.2.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.196.2.aarch64",
"product_id": "kernel-syms-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.196.2.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.196.2.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.196.2.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.196.2.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.196.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.196.2.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.196.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.196.2.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.196.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.196.2.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.196.2.noarch",
"product_id": "kernel-devel-4.4.121-92.196.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.196.2.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.196.2.noarch",
"product_id": "kernel-docs-4.4.121-92.196.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.196.2.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.196.2.noarch",
"product_id": "kernel-docs-html-4.4.121-92.196.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.196.2.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.196.2.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.196.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.196.2.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.196.2.noarch",
"product_id": "kernel-macros-4.4.121-92.196.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.196.2.noarch",
"product": {
"name": "kernel-source-4.4.121-92.196.2.noarch",
"product_id": "kernel-source-4.4.121-92.196.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.196.2.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.196.2.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.196.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.196.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.196.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.196.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.196.2.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.196.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.196.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.196.2.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.196.2.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.196.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.196.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.196.2.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.196.2.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.196.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.196.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.196.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.196.2.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.196.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.196.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.196.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.196.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.196.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.196.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.196.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.196.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.196.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.196.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-default-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-syms-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.196.2.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.196.2.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.196.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.196.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.196.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.196.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.196.2.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.196.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.196.2.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.196.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.196.2.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.196.2.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.196.2.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.196.2.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.196.2.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.196.2.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.196.2.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.196.2.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.196.2.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.196.2.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.196.2.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.196.2.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.196.2.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.196.2.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.196.2.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.196.2.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-default-4.4.121-92.196.2.s390x",
"product_id": "kernel-default-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.196.2.s390x",
"product_id": "kernel-default-base-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.196.2.s390x",
"product_id": "kernel-default-devel-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.196.2.s390x",
"product_id": "kernel-default-extra-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.196.2.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.196.2.s390x",
"product_id": "kernel-default-man-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.196.2.s390x",
"product_id": "kernel-obs-build-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.196.2.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.196.2.s390x",
"product_id": "kernel-syms-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.196.2.s390x",
"product_id": "kernel-vanilla-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.196.2.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.196.2.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.196.2.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.196.2.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.196.2.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.196.2.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.196.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.196.2.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.196.2.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.196.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.196.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.196.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.196.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.196.2.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.196.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.196.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.196.2.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.196.2.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.196.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.196.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.196.2.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.196.2.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.196.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.196.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.196.2.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.196.2.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.196.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.196.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.196.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.196.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.196.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.196.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.196.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.196.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.196.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.196.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.196.2.x86_64",
"product_id": "kernel-default-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.196.2.x86_64",
"product_id": "kernel-default-base-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.196.2.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.196.2.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.196.2.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.196.2.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.196.2.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.196.2.x86_64",
"product_id": "kernel-syms-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.196.2.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.196.2.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.196.2.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.196.2.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.196.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.196.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.196.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.196.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.196.2.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.196.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.196.2.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.196.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.196.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.196.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.196.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.196.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.196.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.196.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.196.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.196.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.196.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.196.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.196.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch"
},
"product_reference": "kernel-source-4.4.121-92.196.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.196.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.196.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3874"
}
],
"notes": [
{
"category": "general",
"text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3874",
"url": "https://www.suse.com/security/cve/CVE-2019-3874"
},
{
"category": "external",
"summary": "SUSE Bug 1129898 for CVE-2019-3874",
"url": "https://bugzilla.suse.com/1129898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-3874"
},
{
"cve": "CVE-2020-26541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26541"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26541",
"url": "https://www.suse.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "SUSE Bug 1177282 for CVE-2020-26541",
"url": "https://bugzilla.suse.com/1177282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2021-4037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4037"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4037",
"url": "https://www.suse.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2021-4037",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3542",
"url": "https://www.suse.com/security/cve/CVE-2022-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1204402 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3594"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3594",
"url": "https://www.suse.com/security/cve/CVE-2022-3594"
},
{
"category": "external",
"summary": "SUSE Bug 1204479 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3629"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3629",
"url": "https://www.suse.com/security/cve/CVE-2022-3629"
},
{
"category": "external",
"summary": "SUSE Bug 1204635 for CVE-2022-3629",
"url": "https://bugzilla.suse.com/1204635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "low"
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-40307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40307"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40307",
"url": "https://www.suse.com/security/cve/CVE-2022-40307"
},
{
"category": "external",
"summary": "SUSE Bug 1203322 for CVE-2022-40307",
"url": "https://bugzilla.suse.com/1203322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42703"
}
],
"notes": [
{
"category": "general",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42703",
"url": "https://www.suse.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "SUSE Bug 1204168 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "external",
"summary": "SUSE Bug 1204170 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "external",
"summary": "SUSE Bug 1206463 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1206463"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "important"
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.196.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.196.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.196.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:23:28Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2025:03626-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-49980: USB: gadget: fix use-after-free read in usb_udc_uevent() (bsc#1245110).\n- CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev-\u003e{dev_name,short_name} (bsc#1246968).\n- CVE-2022-50248: wifi: iwlwifi: mvm: fix double free on tx path (bsc#1249840).\n- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).\n- CVE-2022-50258: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (bsc#1249947).\n- CVE-2022-50381: md: fix a crash in mempool_free (bsc#1250257).\n- CVE-2022-50386: Bluetooth: L2CAP: Fix user-after-free (bsc#1250301).\n- CVE-2022-50401: nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (bsc#1250140).\n- CVE-2022-50408: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (bsc#1250391).\n- CVE-2022-50409: net: If sock is dead do not access sock\u0027s sk_wq in sk_stream_wait_memory (bsc#1250392).\n- CVE-2022-50412: drm: bridge: adv7511: unregister cec i2c device after cec adapter (bsc#1250189).\n- CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827).\n- CVE-2023-53220: media: az6007: Fix null-ptr-deref in az6007_i2c_xfer() (bsc#1250337).\n- CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).\n- CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).\n- CVE-2024-53093: nvme-multipath: defer partition scanning (bsc#1233640).\n- CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784).\n- CVE-2025-38011: drm/amdgpu: csa unmap use uninterruptible lock (bsc#1244729).\n- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).\n- CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963).\n- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).\n- CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).\n- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).\n- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).\n- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).\n- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).\n- CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (bsc#1249538).\n- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).\n\nThe following non-security bugs were fixed:\n\n- Limit patch filenames to 100 characters (bsc#1249604).\n- Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108).\n- git_sort: Make tests independent of environment.\n- hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (git-fixes).\n- kernel-binary: Another installation ordering fix (bsc#1241353).\n- kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522).\n- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346).\n- kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).\n- rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879).\n- rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337).\n- rpm: Configure KABI checkingness macro (bsc#1249186).\n- rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186).\n- scripts/python/kss-dashboard: attempt getting smash data\n- scripts/python/kss-dashboard: fetch into repos if stale\n- scripts/python/kss-dashboard: implement CVSSv3.1 score consistency check\n- scripts/python/kss-dashboard: prepare for the alternative CVE branch\n- scripts/python/kss-dashboard: simplify control flow\n- scripts/python/kss-dashboard: speed up patch checking a bit\n- scripts/python/kss-dashboard: use decorator to handle exceptions\n- scripts/tar-up: Remove mkspec only affter running it.\n- scripts: Import arch-symbols script from packaging\n- scripts: Import guards script from packaging\n- scripts: test_linux_git.py: Do not complain about missing cwd\n- sequence-patch: Use arch-symbols\n- suse_git/header: Complain about patch filenames over 100 characters.\n- tar-up: Also sort generated tar archives\n- tar-up: Handle multiple levels of symlinks\n- tar-up: Normalize file modes to ones supported by git\n- tar-up: Remove mkspec and its inputs as from target directory (bsc#1250522).\n- tar-up: Remove the $build_dir prefix when in $build_dir\n- tar-up: Set owner of files in generated tar archives to root rather than nobody\n- tar_up: Handle symlinks in rpm directory\n- use uniform permission checks for all mount propagation changes (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3626,SUSE-SLE-Module-Live-Patching-15-SP3-2025-3626,SUSE-SLE-Product-HA-15-SP3-2025-3626,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3626,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3626,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3626,SUSE-SUSE-MicroOS-5.1-2025-3626,SUSE-SUSE-MicroOS-5.2-2025-3626,SUSE-Storage-7.1-2025-3626",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_03626-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:03626-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503626-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:03626-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html"
},
{
"category": "self",
"summary": "SUSE Bug 1202700",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "self",
"summary": "SUSE Bug 1203063",
"url": "https://bugzilla.suse.com/1203063"
},
{
"category": "self",
"summary": "SUSE Bug 1203332",
"url": "https://bugzilla.suse.com/1203332"
},
{
"category": "self",
"summary": "SUSE Bug 1204228",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1206883",
"url": "https://bugzilla.suse.com/1206883"
},
{
"category": "self",
"summary": "SUSE Bug 1206884",
"url": "https://bugzilla.suse.com/1206884"
},
{
"category": "self",
"summary": "SUSE Bug 1209287",
"url": "https://bugzilla.suse.com/1209287"
},
{
"category": "self",
"summary": "SUSE Bug 1209291",
"url": "https://bugzilla.suse.com/1209291"
},
{
"category": "self",
"summary": "SUSE Bug 1210124",
"url": "https://bugzilla.suse.com/1210124"
},
{
"category": "self",
"summary": "SUSE Bug 1210584",
"url": "https://bugzilla.suse.com/1210584"
},
{
"category": "self",
"summary": "SUSE Bug 1213061",
"url": "https://bugzilla.suse.com/1213061"
},
{
"category": "self",
"summary": "SUSE Bug 1213666",
"url": "https://bugzilla.suse.com/1213666"
},
{
"category": "self",
"summary": "SUSE Bug 1215150",
"url": "https://bugzilla.suse.com/1215150"
},
{
"category": "self",
"summary": "SUSE Bug 1216976",
"url": "https://bugzilla.suse.com/1216976"
},
{
"category": "self",
"summary": "SUSE Bug 1220185",
"url": "https://bugzilla.suse.com/1220185"
},
{
"category": "self",
"summary": "SUSE Bug 1220186",
"url": "https://bugzilla.suse.com/1220186"
},
{
"category": "self",
"summary": "SUSE Bug 1233640",
"url": "https://bugzilla.suse.com/1233640"
},
{
"category": "self",
"summary": "SUSE Bug 1240784",
"url": "https://bugzilla.suse.com/1240784"
},
{
"category": "self",
"summary": "SUSE Bug 1241353",
"url": "https://bugzilla.suse.com/1241353"
},
{
"category": "self",
"summary": "SUSE Bug 1243278",
"url": "https://bugzilla.suse.com/1243278"
},
{
"category": "self",
"summary": "SUSE Bug 1244337",
"url": "https://bugzilla.suse.com/1244337"
},
{
"category": "self",
"summary": "SUSE Bug 1244729",
"url": "https://bugzilla.suse.com/1244729"
},
{
"category": "self",
"summary": "SUSE Bug 1245110",
"url": "https://bugzilla.suse.com/1245110"
},
{
"category": "self",
"summary": "SUSE Bug 1245956",
"url": "https://bugzilla.suse.com/1245956"
},
{
"category": "self",
"summary": "SUSE Bug 1245963",
"url": "https://bugzilla.suse.com/1245963"
},
{
"category": "self",
"summary": "SUSE Bug 1246879",
"url": "https://bugzilla.suse.com/1246879"
},
{
"category": "self",
"summary": "SUSE Bug 1246968",
"url": "https://bugzilla.suse.com/1246968"
},
{
"category": "self",
"summary": "SUSE Bug 1247172",
"url": "https://bugzilla.suse.com/1247172"
},
{
"category": "self",
"summary": "SUSE Bug 1247239",
"url": "https://bugzilla.suse.com/1247239"
},
{
"category": "self",
"summary": "SUSE Bug 1248108",
"url": "https://bugzilla.suse.com/1248108"
},
{
"category": "self",
"summary": "SUSE Bug 1248255",
"url": "https://bugzilla.suse.com/1248255"
},
{
"category": "self",
"summary": "SUSE Bug 1248399",
"url": "https://bugzilla.suse.com/1248399"
},
{
"category": "self",
"summary": "SUSE Bug 1248628",
"url": "https://bugzilla.suse.com/1248628"
},
{
"category": "self",
"summary": "SUSE Bug 1248847",
"url": "https://bugzilla.suse.com/1248847"
},
{
"category": "self",
"summary": "SUSE Bug 1249186",
"url": "https://bugzilla.suse.com/1249186"
},
{
"category": "self",
"summary": "SUSE Bug 1249200",
"url": "https://bugzilla.suse.com/1249200"
},
{
"category": "self",
"summary": "SUSE Bug 1249220",
"url": "https://bugzilla.suse.com/1249220"
},
{
"category": "self",
"summary": "SUSE Bug 1249346",
"url": "https://bugzilla.suse.com/1249346"
},
{
"category": "self",
"summary": "SUSE Bug 1249538",
"url": "https://bugzilla.suse.com/1249538"
},
{
"category": "self",
"summary": "SUSE Bug 1249604",
"url": "https://bugzilla.suse.com/1249604"
},
{
"category": "self",
"summary": "SUSE Bug 1249664",
"url": "https://bugzilla.suse.com/1249664"
},
{
"category": "self",
"summary": "SUSE Bug 1249667",
"url": "https://bugzilla.suse.com/1249667"
},
{
"category": "self",
"summary": "SUSE Bug 1249700",
"url": "https://bugzilla.suse.com/1249700"
},
{
"category": "self",
"summary": "SUSE Bug 1249713",
"url": "https://bugzilla.suse.com/1249713"
},
{
"category": "self",
"summary": "SUSE Bug 1249716",
"url": "https://bugzilla.suse.com/1249716"
},
{
"category": "self",
"summary": "SUSE Bug 1249718",
"url": "https://bugzilla.suse.com/1249718"
},
{
"category": "self",
"summary": "SUSE Bug 1249734",
"url": "https://bugzilla.suse.com/1249734"
},
{
"category": "self",
"summary": "SUSE Bug 1249740",
"url": "https://bugzilla.suse.com/1249740"
},
{
"category": "self",
"summary": "SUSE Bug 1249743",
"url": "https://bugzilla.suse.com/1249743"
},
{
"category": "self",
"summary": "SUSE Bug 1249747",
"url": "https://bugzilla.suse.com/1249747"
},
{
"category": "self",
"summary": "SUSE Bug 1249808",
"url": "https://bugzilla.suse.com/1249808"
},
{
"category": "self",
"summary": "SUSE Bug 1249825",
"url": "https://bugzilla.suse.com/1249825"
},
{
"category": "self",
"summary": "SUSE Bug 1249827",
"url": "https://bugzilla.suse.com/1249827"
},
{
"category": "self",
"summary": "SUSE Bug 1249840",
"url": "https://bugzilla.suse.com/1249840"
},
{
"category": "self",
"summary": "SUSE Bug 1249846",
"url": "https://bugzilla.suse.com/1249846"
},
{
"category": "self",
"summary": "SUSE Bug 1249880",
"url": "https://bugzilla.suse.com/1249880"
},
{
"category": "self",
"summary": "SUSE Bug 1249885",
"url": "https://bugzilla.suse.com/1249885"
},
{
"category": "self",
"summary": "SUSE Bug 1249908",
"url": "https://bugzilla.suse.com/1249908"
},
{
"category": "self",
"summary": "SUSE Bug 1249918",
"url": "https://bugzilla.suse.com/1249918"
},
{
"category": "self",
"summary": "SUSE Bug 1249923",
"url": "https://bugzilla.suse.com/1249923"
},
{
"category": "self",
"summary": "SUSE Bug 1249930",
"url": "https://bugzilla.suse.com/1249930"
},
{
"category": "self",
"summary": "SUSE Bug 1249947",
"url": "https://bugzilla.suse.com/1249947"
},
{
"category": "self",
"summary": "SUSE Bug 1249949",
"url": "https://bugzilla.suse.com/1249949"
},
{
"category": "self",
"summary": "SUSE Bug 1250002",
"url": "https://bugzilla.suse.com/1250002"
},
{
"category": "self",
"summary": "SUSE Bug 1250009",
"url": "https://bugzilla.suse.com/1250009"
},
{
"category": "self",
"summary": "SUSE Bug 1250014",
"url": "https://bugzilla.suse.com/1250014"
},
{
"category": "self",
"summary": "SUSE Bug 1250041",
"url": "https://bugzilla.suse.com/1250041"
},
{
"category": "self",
"summary": "SUSE Bug 1250131",
"url": "https://bugzilla.suse.com/1250131"
},
{
"category": "self",
"summary": "SUSE Bug 1250132",
"url": "https://bugzilla.suse.com/1250132"
},
{
"category": "self",
"summary": "SUSE Bug 1250140",
"url": "https://bugzilla.suse.com/1250140"
},
{
"category": "self",
"summary": "SUSE Bug 1250180",
"url": "https://bugzilla.suse.com/1250180"
},
{
"category": "self",
"summary": "SUSE Bug 1250183",
"url": "https://bugzilla.suse.com/1250183"
},
{
"category": "self",
"summary": "SUSE Bug 1250187",
"url": "https://bugzilla.suse.com/1250187"
},
{
"category": "self",
"summary": "SUSE Bug 1250189",
"url": "https://bugzilla.suse.com/1250189"
},
{
"category": "self",
"summary": "SUSE Bug 1250257",
"url": "https://bugzilla.suse.com/1250257"
},
{
"category": "self",
"summary": "SUSE Bug 1250269",
"url": "https://bugzilla.suse.com/1250269"
},
{
"category": "self",
"summary": "SUSE Bug 1250277",
"url": "https://bugzilla.suse.com/1250277"
},
{
"category": "self",
"summary": "SUSE Bug 1250301",
"url": "https://bugzilla.suse.com/1250301"
},
{
"category": "self",
"summary": "SUSE Bug 1250313",
"url": "https://bugzilla.suse.com/1250313"
},
{
"category": "self",
"summary": "SUSE Bug 1250337",
"url": "https://bugzilla.suse.com/1250337"
},
{
"category": "self",
"summary": "SUSE Bug 1250391",
"url": "https://bugzilla.suse.com/1250391"
},
{
"category": "self",
"summary": "SUSE Bug 1250392",
"url": "https://bugzilla.suse.com/1250392"
},
{
"category": "self",
"summary": "SUSE Bug 1250394",
"url": "https://bugzilla.suse.com/1250394"
},
{
"category": "self",
"summary": "SUSE Bug 1250522",
"url": "https://bugzilla.suse.com/1250522"
},
{
"category": "self",
"summary": "SUSE Bug 1250764",
"url": "https://bugzilla.suse.com/1250764"
},
{
"category": "self",
"summary": "SUSE Bug 1250767",
"url": "https://bugzilla.suse.com/1250767"
},
{
"category": "self",
"summary": "SUSE Bug 1250774",
"url": "https://bugzilla.suse.com/1250774"
},
{
"category": "self",
"summary": "SUSE Bug 1250787",
"url": "https://bugzilla.suse.com/1250787"
},
{
"category": "self",
"summary": "SUSE Bug 1250790",
"url": "https://bugzilla.suse.com/1250790"
},
{
"category": "self",
"summary": "SUSE Bug 1250797",
"url": "https://bugzilla.suse.com/1250797"
},
{
"category": "self",
"summary": "SUSE Bug 1250799",
"url": "https://bugzilla.suse.com/1250799"
},
{
"category": "self",
"summary": "SUSE Bug 1250823",
"url": "https://bugzilla.suse.com/1250823"
},
{
"category": "self",
"summary": "SUSE Bug 1250847",
"url": "https://bugzilla.suse.com/1250847"
},
{
"category": "self",
"summary": "SUSE Bug 1250850",
"url": "https://bugzilla.suse.com/1250850"
},
{
"category": "self",
"summary": "SUSE Bug 1250853",
"url": "https://bugzilla.suse.com/1250853"
},
{
"category": "self",
"summary": "SUSE Bug 1250868",
"url": "https://bugzilla.suse.com/1250868"
},
{
"category": "self",
"summary": "SUSE Bug 1250890",
"url": "https://bugzilla.suse.com/1250890"
},
{
"category": "self",
"summary": "SUSE Bug 1250891",
"url": "https://bugzilla.suse.com/1250891"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4460 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4460/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2978 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36280 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49980 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50233 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50234 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50235 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50248 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50248/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50249 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50249/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50252 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50257 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50258 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50260 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50260/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50271 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50272 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50299 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50299/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50309 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50312 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50317 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50330 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50344 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50355 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50359 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50367 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50367/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50375 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50381 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50385 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50386 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50401 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50408 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50409 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50410 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50412 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50412/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50414 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50414/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50419 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50422 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50427 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50427/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50431 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50431/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50435 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50437 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50437/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50440 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50440/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50444 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50454 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50458 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50458/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50459 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50459/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50467 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50467/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1380 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28328 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-31248 page",
"url": "https://www.suse.com/security/cve/CVE-2023-31248/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3772 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39197 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42753 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53147 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53178 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53179 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53213 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53220 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53265 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53273 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53273/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53304 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53321 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53333 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53438 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53438/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53492 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26583 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26584 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26584/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53093 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-58240 page",
"url": "https://www.suse.com/security/cve/CVE-2024-58240/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21969 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21969/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38011 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38184 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38216 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38488 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38488/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38553 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38553/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38572 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38572/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38664 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38685 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38713 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39751 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39751/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39823 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39823/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-10-17T06:14:11Z",
"generator": {
"date": "2025-10-17T06:14:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:03626-1",
"initial_release_date": "2025-10-17T06:14:11Z",
"revision_history": [
{
"date": "2025-10-17T06:14:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-al-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-altera-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-amd-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-apm-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-arm-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-cavium-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-exynos-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-freescale-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-lg-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-marvell-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-qcom-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-renesas-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-socionext-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-sprd-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-150300.59.221.1.aarch64",
"product_id": "dtb-zte-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-64kb-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-default-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"product_id": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.221.1.aarch64",
"product_id": "kernel-syms-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.221.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.221.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.221.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150300.59.221.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150300.59.221.1.noarch",
"product_id": "kernel-devel-5.3.18-150300.59.221.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150300.59.221.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150300.59.221.1.noarch",
"product_id": "kernel-docs-5.3.18-150300.59.221.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150300.59.221.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150300.59.221.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150300.59.221.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150300.59.221.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150300.59.221.1.noarch",
"product_id": "kernel-macros-5.3.18-150300.59.221.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150300.59.221.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150300.59.221.1.noarch",
"product_id": "kernel-source-5.3.18-150300.59.221.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150300.59.221.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150300.59.221.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150300.59.221.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-default-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-default-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"product_id": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-default-optional-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-syms-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.221.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-default-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"product_id": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_221-preempt-1-150300.7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_221-preempt-1-150300.7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_221-preempt-1-150300.7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.221.1.x86_64",
"product_id": "kernel-syms-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.221.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.221.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.221.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.221.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.221.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.221.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.221.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.221.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.221.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.221.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.221.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.221.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4460",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4460"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Fix UBSAN shift-out-of-bounds warning\n\nIf get_num_sdma_queues or get_num_xgmi_sdma_queues is 0, we end up\ndoing a shift operation where the number of bits shifted equals\nnumber of bits in the operand. This behaviour is undefined.\n\nSet num_sdma_queues or num_xgmi_sdma_queues to ULLONG_MAX, if the\ncount is \u003e= number of bits in the operand.\n\nBug: https://gitlab.freedesktop.org/drm/amd/-/issues/1472",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4460",
"url": "https://www.suse.com/security/cve/CVE-2021-4460"
},
{
"category": "external",
"summary": "SUSE Bug 1250764 for CVE-2021-4460",
"url": "https://bugzilla.suse.com/1250764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2021-4460"
},
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-2978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2978"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2978",
"url": "https://www.suse.com/security/cve/CVE-2022-2978"
},
{
"category": "external",
"summary": "SUSE Bug 1202700 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "external",
"summary": "SUSE Bug 1204745 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1204745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-36280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36280"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file \u0027/dev/dri/renderD128 (or Dxxx)\u0027. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36280",
"url": "https://www.suse.com/security/cve/CVE-2022-36280"
},
{
"category": "external",
"summary": "SUSE Bug 1203332 for CVE-2022-36280",
"url": "https://bugzilla.suse.com/1203332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-49980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: gadget: Fix use-after-free Read in usb_udc_uevent()\n\nThe syzbot fuzzer found a race between uevent callbacks and gadget\ndriver unregistration that can cause a use-after-free bug:\n\n---------------------------------------------------------------\nBUG: KASAN: use-after-free in usb_udc_uevent+0x11f/0x130\ndrivers/usb/gadget/udc/core.c:1732\nRead of size 8 at addr ffff888078ce2050 by task udevd/2968\n\nCPU: 1 PID: 2968 Comm: udevd Not tainted 5.19.0-rc4-next-20220628-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n06/29/2022\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:317 [inline]\n print_report.cold+0x2ba/0x719 mm/kasan/report.c:433\n kasan_report+0xbe/0x1f0 mm/kasan/report.c:495\n usb_udc_uevent+0x11f/0x130 drivers/usb/gadget/udc/core.c:1732\n dev_uevent+0x290/0x770 drivers/base/core.c:2424\n---------------------------------------------------------------\n\nThe bug occurs because usb_udc_uevent() dereferences udc-\u003edriver but\ndoes so without acquiring the udc_lock mutex, which protects this\nfield. If the gadget driver is unbound from the udc concurrently with\nuevent processing, the driver structure may be accessed after it has\nbeen deallocated.\n\nTo prevent the race, we make sure that the routine holds the mutex\naround the racing accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49980",
"url": "https://www.suse.com/security/cve/CVE-2022-49980"
},
{
"category": "external",
"summary": "SUSE Bug 1245110 for CVE-2022-49980",
"url": "https://bugzilla.suse.com/1245110"
},
{
"category": "external",
"summary": "SUSE Bug 1245111 for CVE-2022-49980",
"url": "https://bugzilla.suse.com/1245111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-49980"
},
{
"cve": "CVE-2022-50233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50233"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: eir: Fix using strlen with hdev-\u003e{dev_name,short_name}\n\nBoth dev_name and short_name are not guaranteed to be NULL terminated so\nthis instead use strnlen and then attempt to determine if the resulting\nstring needs to be truncated or not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50233",
"url": "https://www.suse.com/security/cve/CVE-2022-50233"
},
{
"category": "external",
"summary": "SUSE Bug 1246968 for CVE-2022-50233",
"url": "https://bugzilla.suse.com/1246968"
},
{
"category": "external",
"summary": "SUSE Bug 1249242 for CVE-2022-50233",
"url": "https://bugzilla.suse.com/1249242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50233"
},
{
"cve": "CVE-2022-50234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/af_unix: defer registered files gc to io_uring release\n\nInstead of putting io_uring\u0027s registered files in unix_gc() we want it\nto be done by io_uring itself. The trick here is to consider io_uring\nregistered files for cycle detection but not actually putting them down.\nBecause io_uring can\u0027t register other ring instances, this will remove\nall refs to the ring file triggering the -\u003erelease path and clean up\nwith io_ring_ctx_free().\n\n[axboe: add kerneldoc comment to skb, fold in skb leak fix]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50234",
"url": "https://www.suse.com/security/cve/CVE-2022-50234"
},
{
"category": "external",
"summary": "SUSE Bug 1249664 for CVE-2022-50234",
"url": "https://bugzilla.suse.com/1249664"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50234"
},
{
"cve": "CVE-2022-50235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Protect against send buffer overflow in NFSv2 READDIR\n\nRestore the previous limit on the @count argument to prevent a\nbuffer overflow attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50235",
"url": "https://www.suse.com/security/cve/CVE-2022-50235"
},
{
"category": "external",
"summary": "SUSE Bug 1249667 for CVE-2022-50235",
"url": "https://bugzilla.suse.com/1249667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50235"
},
{
"cve": "CVE-2022-50248",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50248"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: fix double free on tx path.\n\nWe see kernel crashes and lockups and KASAN errors related to ax210\nfirmware crashes. One of the KASAN dumps pointed at the tx path,\nand it appears there is indeed a way to double-free an skb.\n\nIf iwl_mvm_tx_skb_sta returns non-zero, then the \u0027skb\u0027 sent into the\nmethod will be freed. But, in case where we build TSO skb buffer,\nthe skb may also be freed in error case. So, return 0 in that particular\nerror case and do cleanup manually.\n\nBUG: KASAN: use-after-free in __list_del_entry_valid+0x12/0x90\niwlwifi 0000:06:00.0: 0x00000000 | tsf hi\nRead of size 8 at addr ffff88813cfa4ba0 by task btserver/9650\n\nCPU: 4 PID: 9650 Comm: btserver Tainted: G W 5.19.8+ #5\niwlwifi 0000:06:00.0: 0x00000000 | time gp1\nHardware name: Default string Default string/SKYBAY, BIOS 5.12 02/19/2019\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x55/0x6d\n print_report.cold.12+0xf2/0x684\niwlwifi 0000:06:00.0: 0x1D0915A8 | time gp2\n ? __list_del_entry_valid+0x12/0x90\n kasan_report+0x8b/0x180\niwlwifi 0000:06:00.0: 0x00000001 | uCode revision type\n ? __list_del_entry_valid+0x12/0x90\n __list_del_entry_valid+0x12/0x90\niwlwifi 0000:06:00.0: 0x00000048 | uCode version major\n tcp_update_skb_after_send+0x5d/0x170\n __tcp_transmit_skb+0xb61/0x15c0\niwlwifi 0000:06:00.0: 0xDAA05125 | uCode version minor\n ? __tcp_select_window+0x490/0x490\niwlwifi 0000:06:00.0: 0x00000420 | hw version\n ? trace_kmalloc_node+0x29/0xd0\n ? __kmalloc_node_track_caller+0x12a/0x260\n ? memset+0x1f/0x40\n ? __build_skb_around+0x125/0x150\n ? __alloc_skb+0x1d4/0x220\n ? skb_zerocopy_clone+0x55/0x230\niwlwifi 0000:06:00.0: 0x00489002 | board version\n ? kmalloc_reserve+0x80/0x80\n ? rcu_read_lock_bh_held+0x60/0xb0\n tcp_write_xmit+0x3f1/0x24d0\niwlwifi 0000:06:00.0: 0x034E001C | hcmd\n ? __check_object_size+0x180/0x350\niwlwifi 0000:06:00.0: 0x24020000 | isr0\n tcp_sendmsg_locked+0x8a9/0x1520\niwlwifi 0000:06:00.0: 0x01400000 | isr1\n ? tcp_sendpage+0x50/0x50\niwlwifi 0000:06:00.0: 0x48F0000A | isr2\n ? lock_release+0xb9/0x400\n ? tcp_sendmsg+0x14/0x40\niwlwifi 0000:06:00.0: 0x00C3080C | isr3\n ? lock_downgrade+0x390/0x390\n ? do_raw_spin_lock+0x114/0x1d0\niwlwifi 0000:06:00.0: 0x00200000 | isr4\n ? rwlock_bug.part.2+0x50/0x50\niwlwifi 0000:06:00.0: 0x034A001C | last cmd Id\n ? rwlock_bug.part.2+0x50/0x50\n ? lockdep_hardirqs_on_prepare+0xe/0x200\niwlwifi 0000:06:00.0: 0x0000C2F0 | wait_event\n ? __local_bh_enable_ip+0x87/0xe0\n ? inet_send_prepare+0x220/0x220\niwlwifi 0000:06:00.0: 0x000000C4 | l2p_control\n tcp_sendmsg+0x22/0x40\n sock_sendmsg+0x5f/0x70\niwlwifi 0000:06:00.0: 0x00010034 | l2p_duration\n __sys_sendto+0x19d/0x250\niwlwifi 0000:06:00.0: 0x00000007 | l2p_mhvalid\n ? __ia32_sys_getpeername+0x40/0x40\niwlwifi 0000:06:00.0: 0x00000000 | l2p_addr_match\n ? rcu_read_lock_held_common+0x12/0x50\n ? rcu_read_lock_sched_held+0x5a/0xd0\n ? rcu_read_lock_bh_held+0xb0/0xb0\n ? rcu_read_lock_sched_held+0x5a/0xd0\n ? rcu_read_lock_sched_held+0x5a/0xd0\n ? lock_release+0xb9/0x400\n ? lock_downgrade+0x390/0x390\n ? ktime_get+0x64/0x130\n ? ktime_get+0x8d/0x130\n ? rcu_read_lock_held_common+0x12/0x50\n ? rcu_read_lock_sched_held+0x5a/0xd0\n ? rcu_read_lock_held_common+0x12/0x50\n ? rcu_read_lock_sched_held+0x5a/0xd0\n ? rcu_read_lock_bh_held+0xb0/0xb0\n ? rcu_read_lock_bh_held+0xb0/0xb0\n __x64_sys_sendto+0x6f/0x80\n do_syscall_64+0x34/0xb0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033:0x7f1d126e4531\nCode: 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 35 80 0c 00 41 89 ca 8b 00 85 c0 75 1c 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 67 c3 66 0f 1f 44 00 00 55 48 83 ec 20 48 89\nRSP: 002b:00007ffe21a679d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 000000000000ffdc RCX: 00007f1d126e4531\nRDX: 0000000000010000 RSI: 000000000374acf0 RDI: 0000000000000014\nRBP: 00007ffe21a67ac0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50248",
"url": "https://www.suse.com/security/cve/CVE-2022-50248"
},
{
"category": "external",
"summary": "SUSE Bug 1249840 for CVE-2022-50248",
"url": "https://bugzilla.suse.com/1249840"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50248"
},
{
"cve": "CVE-2022-50249",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50249"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: of: Fix refcount leak bug in of_get_ddr_timings()\n\nWe should add the of_node_put() when breaking out of\nfor_each_child_of_node() as it will automatically increase\nand decrease the refcount.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50249",
"url": "https://www.suse.com/security/cve/CVE-2022-50249"
},
{
"category": "external",
"summary": "SUSE Bug 1249747 for CVE-2022-50249",
"url": "https://bugzilla.suse.com/1249747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50249"
},
{
"cve": "CVE-2022-50252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50252"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Do not free q_vector unless new one was allocated\n\nAvoid potential use-after-free condition under memory pressure. If the\nkzalloc() fails, q_vector will be freed but left in the original\nadapter-\u003eq_vector[v_idx] array position.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50252",
"url": "https://www.suse.com/security/cve/CVE-2022-50252"
},
{
"category": "external",
"summary": "SUSE Bug 1249846 for CVE-2022-50252",
"url": "https://bugzilla.suse.com/1249846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50252"
},
{
"cve": "CVE-2022-50257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50257"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/gntdev: Prevent leaking grants\n\nPrior to this commit, if a grant mapping operation failed partially,\nsome of the entries in the map_ops array would be invalid, whereas all\nof the entries in the kmap_ops array would be valid. This in turn would\ncause the following logic in gntdev_map_grant_pages to become invalid:\n\n for (i = 0; i \u003c map-\u003ecount; i++) {\n if (map-\u003emap_ops[i].status == GNTST_okay) {\n map-\u003eunmap_ops[i].handle = map-\u003emap_ops[i].handle;\n if (!use_ptemod)\n alloced++;\n }\n if (use_ptemod) {\n if (map-\u003ekmap_ops[i].status == GNTST_okay) {\n if (map-\u003emap_ops[i].status == GNTST_okay)\n alloced++;\n map-\u003ekunmap_ops[i].handle = map-\u003ekmap_ops[i].handle;\n }\n }\n }\n ...\n atomic_add(alloced, \u0026map-\u003elive_grants);\n\nAssume that use_ptemod is true (i.e., the domain mapping the granted\npages is a paravirtualized domain). In the code excerpt above, note that\nthe \"alloced\" variable is only incremented when both kmap_ops[i].status\nand map_ops[i].status are set to GNTST_okay (i.e., both mapping\noperations are successful). However, as also noted above, there are\ncases where a grant mapping operation fails partially, breaking the\nassumption of the code excerpt above.\n\nThe aforementioned causes map-\u003elive_grants to be incorrectly set. In\nsome cases, all of the map_ops mappings fail, but all of the kmap_ops\nmappings succeed, meaning that live_grants may remain zero. This in turn\nmakes it impossible to unmap the successfully grant-mapped pages pointed\nto by kmap_ops, because unmap_grant_pages has the following snippet of\ncode at its beginning:\n\n if (atomic_read(\u0026map-\u003elive_grants) == 0)\n return; /* Nothing to do */\n\nIn other cases where only some of the map_ops mappings fail but all\nkmap_ops mappings succeed, live_grants is made positive, but when the\nuser requests unmapping the grant-mapped pages, __unmap_grant_pages_done\nwill then make map-\u003elive_grants negative, because the latter function\ndoes not check if all of the pages that were requested to be unmapped\nwere actually unmapped, and the same function unconditionally subtracts\n\"data-\u003ecount\" (i.e., a value that can be greater than map-\u003elive_grants)\nfrom map-\u003elive_grants. The side effects of a negative live_grants value\nhave not been studied.\n\nThe net effect of all of this is that grant references are leaked in one\nof the above conditions. In Qubes OS v4.1 (which uses Xen\u0027s grant\nmechanism extensively for X11 GUI isolation), this issue manifests\nitself with warning messages like the following to be printed out by the\nLinux kernel in the VM that had granted pages (that contain X11 GUI\nwindow data) to dom0: \"g.e. 0x1234 still pending\", especially after the\nuser rapidly resizes GUI VM windows (causing some grant-mapping\noperations to partially or completely fail, due to the fact that the VM\nunshares some of the pages as part of the window resizing, making the\npages impossible to grant-map from dom0).\n\nThe fix for this issue involves counting all successful map_ops and\nkmap_ops mappings separately, and then adding the sum to live_grants.\nDuring unmapping, only the number of successfully unmapped grants is\nsubtracted from live_grants. The code is also modified to check for\nnegative live_grants values after the subtraction and warn the user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50257",
"url": "https://www.suse.com/security/cve/CVE-2022-50257"
},
{
"category": "external",
"summary": "SUSE Bug 1249743 for CVE-2022-50257",
"url": "https://bugzilla.suse.com/1249743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50257"
},
{
"cve": "CVE-2022-50258",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50258"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()\n\nThis patch fixes a stack-out-of-bounds read in brcmfmac that occurs\nwhen \u0027buf\u0027 that is not null-terminated is passed as an argument of\nstrsep() in brcmf_c_preinit_dcmds(). This buffer is filled with a firmware\nversion string by memcpy() in brcmf_fil_iovar_data_get().\nThe patch ensures buf is null-terminated.\n\nFound by a modified version of syzkaller.\n\n[ 47.569679][ T1897] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43236b for chip BCM43236/3\n[ 47.582839][ T1897] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available\n[ 47.601565][ T1897] ==================================================================\n[ 47.602574][ T1897] BUG: KASAN: stack-out-of-bounds in strsep+0x1b2/0x1f0\n[ 47.603447][ T1897] Read of size 1 at addr ffffc90001f6f000 by task kworker/0:2/1897\n[ 47.604336][ T1897]\n[ 47.604621][ T1897] CPU: 0 PID: 1897 Comm: kworker/0:2 Tainted: G O 5.14.0+ #131\n[ 47.605617][ T1897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\n[ 47.606907][ T1897] Workqueue: usb_hub_wq hub_event\n[ 47.607453][ T1897] Call Trace:\n[ 47.607801][ T1897] dump_stack_lvl+0x8e/0xd1\n[ 47.608295][ T1897] print_address_description.constprop.0.cold+0xf/0x334\n[ 47.609009][ T1897] ? strsep+0x1b2/0x1f0\n[ 47.609434][ T1897] ? strsep+0x1b2/0x1f0\n[ 47.609863][ T1897] kasan_report.cold+0x83/0xdf\n[ 47.610366][ T1897] ? strsep+0x1b2/0x1f0\n[ 47.610882][ T1897] strsep+0x1b2/0x1f0\n[ 47.611300][ T1897] ? brcmf_fil_iovar_data_get+0x3a/0xf0\n[ 47.611883][ T1897] brcmf_c_preinit_dcmds+0x995/0xc40\n[ 47.612434][ T1897] ? brcmf_c_set_joinpref_default+0x100/0x100\n[ 47.613078][ T1897] ? rcu_read_lock_sched_held+0xa1/0xd0\n[ 47.613662][ T1897] ? rcu_read_lock_bh_held+0xb0/0xb0\n[ 47.614208][ T1897] ? lock_acquire+0x19d/0x4e0\n[ 47.614704][ T1897] ? find_held_lock+0x2d/0x110\n[ 47.615236][ T1897] ? brcmf_usb_deq+0x1a7/0x260\n[ 47.615741][ T1897] ? brcmf_usb_rx_fill_all+0x5a/0xf0\n[ 47.616288][ T1897] brcmf_attach+0x246/0xd40\n[ 47.616758][ T1897] ? wiphy_new_nm+0x1703/0x1dd0\n[ 47.617280][ T1897] ? kmemdup+0x43/0x50\n[ 47.617720][ T1897] brcmf_usb_probe+0x12de/0x1690\n[ 47.618244][ T1897] ? brcmf_usbdev_qinit.constprop.0+0x470/0x470\n[ 47.618901][ T1897] usb_probe_interface+0x2aa/0x760\n[ 47.619429][ T1897] ? usb_probe_device+0x250/0x250\n[ 47.619950][ T1897] really_probe+0x205/0xb70\n[ 47.620435][ T1897] ? driver_allows_async_probing+0x130/0x130\n[ 47.621048][ T1897] __driver_probe_device+0x311/0x4b0\n[ 47.621595][ T1897] ? driver_allows_async_probing+0x130/0x130\n[ 47.622209][ T1897] driver_probe_device+0x4e/0x150\n[ 47.622739][ T1897] __device_attach_driver+0x1cc/0x2a0\n[ 47.623287][ T1897] bus_for_each_drv+0x156/0x1d0\n[ 47.623796][ T1897] ? bus_rescan_devices+0x30/0x30\n[ 47.624309][ T1897] ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n[ 47.624907][ T1897] ? trace_hardirqs_on+0x46/0x160\n[ 47.625437][ T1897] __device_attach+0x23f/0x3a0\n[ 47.625924][ T1897] ? device_bind_driver+0xd0/0xd0\n[ 47.626433][ T1897] ? kobject_uevent_env+0x287/0x14b0\n[ 47.627057][ T1897] bus_probe_device+0x1da/0x290\n[ 47.627557][ T1897] device_add+0xb7b/0x1eb0\n[ 47.628027][ T1897] ? wait_for_completion+0x290/0x290\n[ 47.628593][ T1897] ? __fw_devlink_link_to_suppliers+0x5a0/0x5a0\n[ 47.629249][ T1897] usb_set_configuration+0xf59/0x16f0\n[ 47.629829][ T1897] usb_generic_driver_probe+0x82/0xa0\n[ 47.630385][ T1897] usb_probe_device+0xbb/0x250\n[ 47.630927][ T1897] ? usb_suspend+0x590/0x590\n[ 47.631397][ T1897] really_probe+0x205/0xb70\n[ 47.631855][ T1897] ? driver_allows_async_probing+0x130/0x130\n[ 47.632469][ T1897] __driver_probe_device+0x311/0x4b0\n[ 47.633002][ \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50258",
"url": "https://www.suse.com/security/cve/CVE-2022-50258"
},
{
"category": "external",
"summary": "SUSE Bug 1249947 for CVE-2022-50258",
"url": "https://bugzilla.suse.com/1249947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50258"
},
{
"cve": "CVE-2022-50260",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50260"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Make .remove and .shutdown HW shutdown consistent\n\nDrivers\u0027 .remove and .shutdown callbacks are executed on different code\npaths. The former is called when a device is removed from the bus, while\nthe latter is called at system shutdown time to quiesce the device.\n\nThis means that some overlap exists between the two, because both have to\ntake care of properly shutting down the hardware. But currently the logic\nused in these two callbacks isn\u0027t consistent in msm drivers, which could\nlead to kernel panic.\n\nFor example, on .remove the component is deleted and its .unbind callback\nleads to the hardware being shutdown but only if the DRM device has been\nmarked as registered.\n\nThat check doesn\u0027t exist in the .shutdown logic and this can lead to the\ndriver calling drm_atomic_helper_shutdown() for a DRM device that hasn\u0027t\nbeen properly initialized.\n\nA situation like this can happen if drivers for expected sub-devices fail\nto probe, since the .bind callback will never be executed. If that is the\ncase, drm_atomic_helper_shutdown() will attempt to take mutexes that are\nonly initialized if drm_mode_config_init() is called during a device bind.\n\nThis bug was attempted to be fixed in commit 623f279c7781 (\"drm/msm: fix\nshutdown hook in case GPU components failed to bind\"), but unfortunately\nit still happens in some cases as the one mentioned above, i.e:\n\n systemd-shutdown[1]: Powering off.\n kvm: exiting hardware virtualization\n platform wifi-firmware.0: Removing from iommu group 12\n platform video-firmware.0: Removing from iommu group 10\n ------------[ cut here ]------------\n WARNING: CPU: 6 PID: 1 at drivers/gpu/drm/drm_modeset_lock.c:317 drm_modeset_lock_all_ctx+0x3c4/0x3d0\n ...\n Hardware name: Google CoachZ (rev3+) (DT)\n pstate: a0400009 (NzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : drm_modeset_lock_all_ctx+0x3c4/0x3d0\n lr : drm_modeset_lock_all_ctx+0x48/0x3d0\n sp : ffff80000805bb80\n x29: ffff80000805bb80 x28: ffff327c00128000 x27: 0000000000000000\n x26: 0000000000000000 x25: 0000000000000001 x24: ffffc95d820ec030\n x23: ffff327c00bbd090 x22: ffffc95d8215eca0 x21: ffff327c039c5800\n x20: ffff327c039c5988 x19: ffff80000805bbe8 x18: 0000000000000034\n x17: 000000040044ffff x16: ffffc95d80cac920 x15: 0000000000000000\n x14: 0000000000000315 x13: 0000000000000315 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff80000805bc28 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : ffff327c00128000 x1 : 0000000000000000 x0 : ffff327c039c59b0\n Call trace:\n drm_modeset_lock_all_ctx+0x3c4/0x3d0\n drm_atomic_helper_shutdown+0x70/0x134\n msm_drv_shutdown+0x30/0x40\n platform_shutdown+0x28/0x40\n device_shutdown+0x148/0x350\n kernel_power_off+0x38/0x80\n __do_sys_reboot+0x288/0x2c0\n __arm64_sys_reboot+0x28/0x34\n invoke_syscall+0x48/0x114\n el0_svc_common.constprop.0+0x44/0xec\n do_el0_svc+0x2c/0xc0\n el0_svc+0x2c/0x84\n el0t_64_sync_handler+0x11c/0x150\n el0t_64_sync+0x18c/0x190\n ---[ end trace 0000000000000000 ]---\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018\n Mem abort info:\n ESR = 0x0000000096000004\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000004\n CM = 0, WnR = 0\n user pgtable: 4k pages, 48-bit VAs, pgdp=000000010eab1000\n [0000000000000018] pgd=0000000000000000, p4d=0000000000000000\n Internal error: Oops: 96000004 [#1] PREEMPT SMP\n ...\n Hardware name: Google CoachZ (rev3+) (DT)\n pstate: a0400009 (NzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : ww_mutex_lock+0x28/0x32c\n lr : drm_modeset_lock_all_ctx+0x1b0/0x3d0\n sp : ffff80000805bb50\n x29: ffff80000805bb50 x28: ffff327c00128000 x27: 0000000000000000\n x26: 00000\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50260",
"url": "https://www.suse.com/security/cve/CVE-2022-50260"
},
{
"category": "external",
"summary": "SUSE Bug 1249885 for CVE-2022-50260",
"url": "https://bugzilla.suse.com/1249885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50260"
},
{
"cve": "CVE-2022-50271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50271"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost/vsock: Use kvmalloc/kvfree for larger packets.\n\nWhen copying a large file over sftp over vsock, data size is usually 32kB,\nand kmalloc seems to fail to try to allocate 32 32kB regions.\n\n vhost-5837: page allocation failure: order:4, mode:0x24040c0\n Call Trace:\n [\u003cffffffffb6a0df64\u003e] dump_stack+0x97/0xdb\n [\u003cffffffffb68d6aed\u003e] warn_alloc_failed+0x10f/0x138\n [\u003cffffffffb68d868a\u003e] ? __alloc_pages_direct_compact+0x38/0xc8\n [\u003cffffffffb664619f\u003e] __alloc_pages_nodemask+0x84c/0x90d\n [\u003cffffffffb6646e56\u003e] alloc_kmem_pages+0x17/0x19\n [\u003cffffffffb6653a26\u003e] kmalloc_order_trace+0x2b/0xdb\n [\u003cffffffffb66682f3\u003e] __kmalloc+0x177/0x1f7\n [\u003cffffffffb66e0d94\u003e] ? copy_from_iter+0x8d/0x31d\n [\u003cffffffffc0689ab7\u003e] vhost_vsock_handle_tx_kick+0x1fa/0x301 [vhost_vsock]\n [\u003cffffffffc06828d9\u003e] vhost_worker+0xf7/0x157 [vhost]\n [\u003cffffffffb683ddce\u003e] kthread+0xfd/0x105\n [\u003cffffffffc06827e2\u003e] ? vhost_dev_set_owner+0x22e/0x22e [vhost]\n [\u003cffffffffb683dcd1\u003e] ? flush_kthread_worker+0xf3/0xf3\n [\u003cffffffffb6eb332e\u003e] ret_from_fork+0x4e/0x80\n [\u003cffffffffb683dcd1\u003e] ? flush_kthread_worker+0xf3/0xf3\n\nWork around by doing kvmalloc instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50271",
"url": "https://www.suse.com/security/cve/CVE-2022-50271"
},
{
"category": "external",
"summary": "SUSE Bug 1249740 for CVE-2022-50271",
"url": "https://bugzilla.suse.com/1249740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50271"
},
{
"cve": "CVE-2022-50272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50272"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()\n\nWei Chen reports a kernel bug as blew:\n\ngeneral protection fault, probably for non-canonical address\nKASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n...\nCall Trace:\n\u003cTASK\u003e\n__i2c_transfer+0x77e/0x1930 drivers/i2c/i2c-core-base.c:2109\ni2c_transfer+0x1d5/0x3d0 drivers/i2c/i2c-core-base.c:2170\ni2cdev_ioctl_rdwr+0x393/0x660 drivers/i2c/i2c-dev.c:297\ni2cdev_ioctl+0x75d/0x9f0 drivers/i2c/i2c-dev.c:458\nvfs_ioctl fs/ioctl.c:51 [inline]\n__do_sys_ioctl fs/ioctl.c:870 [inline]\n__se_sys_ioctl+0xfb/0x170 fs/ioctl.c:856\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x3d/0x90 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7fd834a8bded\n\nIn az6027_i2c_xfer(), if msg[i].addr is 0x99,\na null-ptr-deref will caused when accessing msg[i].buf.\nFor msg[i].len is 0 and msg[i].buf is null.\n\nFix this by checking msg[i].len in az6027_i2c_xfer().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50272",
"url": "https://www.suse.com/security/cve/CVE-2022-50272"
},
{
"category": "external",
"summary": "SUSE Bug 1249808 for CVE-2022-50272",
"url": "https://bugzilla.suse.com/1249808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50272"
},
{
"cve": "CVE-2022-50299",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50299"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: Replace snprintf with scnprintf\n\nCurrent code produces a warning as shown below when total characters\nin the constituent block device names plus the slashes exceeds 200.\nsnprintf() returns the number of characters generated from the given\ninput, which could cause the expression \"200 - len\" to wrap around\nto a large positive number. Fix this by using scnprintf() instead,\nwhich returns the actual number of characters written into the buffer.\n\n[ 1513.267938] ------------[ cut here ]------------\n[ 1513.267943] WARNING: CPU: 15 PID: 37247 at \u003csnip\u003e/lib/vsprintf.c:2509 vsnprintf+0x2c8/0x510\n[ 1513.267944] Modules linked in: \u003csnip\u003e\n[ 1513.267969] CPU: 15 PID: 37247 Comm: mdadm Not tainted 5.4.0-1085-azure #90~18.04.1-Ubuntu\n[ 1513.267969] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\n[ 1513.267971] RIP: 0010:vsnprintf+0x2c8/0x510\n\u003c-snip-\u003e\n[ 1513.267982] Call Trace:\n[ 1513.267986] snprintf+0x45/0x70\n[ 1513.267990] ? disk_name+0x71/0xa0\n[ 1513.267993] dump_zones+0x114/0x240 [raid0]\n[ 1513.267996] ? _cond_resched+0x19/0x40\n[ 1513.267998] raid0_run+0x19e/0x270 [raid0]\n[ 1513.268000] md_run+0x5e0/0xc50\n[ 1513.268003] ? security_capable+0x3f/0x60\n[ 1513.268005] do_md_run+0x19/0x110\n[ 1513.268006] md_ioctl+0x195e/0x1f90\n[ 1513.268007] blkdev_ioctl+0x91f/0x9f0\n[ 1513.268010] block_ioctl+0x3d/0x50\n[ 1513.268012] do_vfs_ioctl+0xa9/0x640\n[ 1513.268014] ? __fput+0x162/0x260\n[ 1513.268016] ksys_ioctl+0x75/0x80\n[ 1513.268017] __x64_sys_ioctl+0x1a/0x20\n[ 1513.268019] do_syscall_64+0x5e/0x200\n[ 1513.268021] entry_SYSCALL_64_after_hwframe+0x44/0xa9",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50299",
"url": "https://www.suse.com/security/cve/CVE-2022-50299"
},
{
"category": "external",
"summary": "SUSE Bug 1249734 for CVE-2022-50299",
"url": "https://bugzilla.suse.com/1249734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50299"
},
{
"cve": "CVE-2022-50309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50309"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50309",
"url": "https://www.suse.com/security/cve/CVE-2022-50309"
},
{
"category": "external",
"summary": "SUSE Bug 1249718 for CVE-2022-50309",
"url": "https://bugzilla.suse.com/1249718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50309"
},
{
"cve": "CVE-2022-50312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50312"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: serial: jsm: fix some leaks in probe\n\nThis error path needs to unwind instead of just returning directly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50312",
"url": "https://www.suse.com/security/cve/CVE-2022-50312"
},
{
"category": "external",
"summary": "SUSE Bug 1249716 for CVE-2022-50312",
"url": "https://bugzilla.suse.com/1249716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50312"
},
{
"cve": "CVE-2022-50317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50317"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: megachips: Fix a null pointer dereference bug\n\nWhen removing the module we will get the following warning:\n\n[ 31.911505] i2c-core: driver [stdp2690-ge-b850v3-fw] unregistered\n[ 31.912484] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI\n[ 31.913338] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\n[ 31.915280] RIP: 0010:drm_bridge_remove+0x97/0x130\n[ 31.921825] Call Trace:\n[ 31.922533] stdp4028_ge_b850v3_fw_remove+0x34/0x60 [megachips_stdpxxxx_ge_b850v3_fw]\n[ 31.923139] i2c_device_remove+0x181/0x1f0\n\nThe two bridges (stdp2690, stdp4028) do not probe at the same time, so\nthe driver does not call ge_b850v3_resgiter() when probing, causing the\ndriver to try to remove the object that has not been initialized.\n\nFix this by checking whether both the bridges are probed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50317",
"url": "https://www.suse.com/security/cve/CVE-2022-50317"
},
{
"category": "external",
"summary": "SUSE Bug 1249713 for CVE-2022-50317",
"url": "https://bugzilla.suse.com/1249713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50317"
},
{
"cve": "CVE-2022-50330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50330"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: cavium - prevent integer overflow loading firmware\n\nThe \"code_length\" value comes from the firmware file. If your firmware\nis untrusted realistically there is probably very little you can do to\nprotect yourself. Still we try to limit the damage as much as possible.\nAlso Smatch marks any data read from the filesystem as untrusted and\nprints warnings if it not capped correctly.\n\nThe \"ntohl(ucode-\u003ecode_length) * 2\" multiplication can have an\ninteger overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50330",
"url": "https://www.suse.com/security/cve/CVE-2022-50330"
},
{
"category": "external",
"summary": "SUSE Bug 1249700 for CVE-2022-50330",
"url": "https://bugzilla.suse.com/1249700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50330"
},
{
"cve": "CVE-2022-50344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50344"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix null-ptr-deref in ext4_write_info\n\nI caught a null-ptr-deref bug as follows:\n==================================================================\nKASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f]\nCPU: 1 PID: 1589 Comm: umount Not tainted 5.10.0-02219-dirty #339\nRIP: 0010:ext4_write_info+0x53/0x1b0\n[...]\nCall Trace:\n dquot_writeback_dquots+0x341/0x9a0\n ext4_sync_fs+0x19e/0x800\n __sync_filesystem+0x83/0x100\n sync_filesystem+0x89/0xf0\n generic_shutdown_super+0x79/0x3e0\n kill_block_super+0xa1/0x110\n deactivate_locked_super+0xac/0x130\n deactivate_super+0xb6/0xd0\n cleanup_mnt+0x289/0x400\n __cleanup_mnt+0x16/0x20\n task_work_run+0x11c/0x1c0\n exit_to_user_mode_prepare+0x203/0x210\n syscall_exit_to_user_mode+0x5b/0x3a0\n do_syscall_64+0x59/0x70\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n ==================================================================\n\nAbove issue may happen as follows:\n-------------------------------------\nexit_to_user_mode_prepare\n task_work_run\n __cleanup_mnt\n cleanup_mnt\n deactivate_super\n deactivate_locked_super\n kill_block_super\n generic_shutdown_super\n shrink_dcache_for_umount\n dentry = sb-\u003es_root\n sb-\u003es_root = NULL \u003c--- Here set NULL\n sync_filesystem\n __sync_filesystem\n sb-\u003es_op-\u003esync_fs \u003e ext4_sync_fs\n dquot_writeback_dquots\n sb-\u003edq_op-\u003ewrite_info \u003e ext4_write_info\n ext4_journal_start(d_inode(sb-\u003es_root), EXT4_HT_QUOTA, 2)\n d_inode(sb-\u003es_root)\n s_root-\u003ed_inode \u003c--- Null pointer dereference\n\nTo solve this problem, we use ext4_journal_start_sb directly\nto avoid s_root being used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50344",
"url": "https://www.suse.com/security/cve/CVE-2022-50344"
},
{
"category": "external",
"summary": "SUSE Bug 1250014 for CVE-2022-50344",
"url": "https://bugzilla.suse.com/1250014"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50344"
},
{
"cve": "CVE-2022-50355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50355"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: vt6655: fix some erroneous memory clean-up loops\n\nIn some initialization functions of this driver, memory is allocated with\n\u0027i\u0027 acting as an index variable and increasing from 0. The commit in\n\"Fixes\" introduces some clean-up codes in case of allocation failure,\nwhich free memory in reverse order with \u0027i\u0027 decreasing to 0. However,\nthere are some problems:\n - The case i=0 is left out. Thus memory is leaked.\n - In case memory allocation fails right from the start, the memory\n freeing loops will start with i=-1 and invalid memory locations will\n be accessed.\n\nOne of these loops has been fixed in commit c8ff91535880 (\"staging:\nvt6655: fix potential memory leak\"). Fix the remaining erroneous loops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50355",
"url": "https://www.suse.com/security/cve/CVE-2022-50355"
},
{
"category": "external",
"summary": "SUSE Bug 1250041 for CVE-2022-50355",
"url": "https://bugzilla.suse.com/1250041"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50355"
},
{
"cve": "CVE-2022-50359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: cx88: Fix a null-ptr-deref bug in buffer_prepare()\n\nWhen the driver calls cx88_risc_buffer() to prepare the buffer, the\nfunction call may fail, resulting in a empty buffer and null-ptr-deref\nlater in buffer_queue().\n\nThe following log can reveal it:\n\n[ 41.822762] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\n[ 41.824488] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n[ 41.828027] RIP: 0010:buffer_queue+0xc2/0x500\n[ 41.836311] Call Trace:\n[ 41.836945] __enqueue_in_driver+0x141/0x360\n[ 41.837262] vb2_start_streaming+0x62/0x4a0\n[ 41.838216] vb2_core_streamon+0x1da/0x2c0\n[ 41.838516] __vb2_init_fileio+0x981/0xbc0\n[ 41.839141] __vb2_perform_fileio+0xbf9/0x1120\n[ 41.840072] vb2_fop_read+0x20e/0x400\n[ 41.840346] v4l2_read+0x215/0x290\n[ 41.840603] vfs_read+0x162/0x4c0\n\nFix this by checking the return value of cx88_risc_buffer()\n\n[hverkuil: fix coding style issues]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50359",
"url": "https://www.suse.com/security/cve/CVE-2022-50359"
},
{
"category": "external",
"summary": "SUSE Bug 1250269 for CVE-2022-50359",
"url": "https://bugzilla.suse.com/1250269"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50359"
},
{
"cve": "CVE-2022-50367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50367"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: fix UAF/GPF bug in nilfs_mdt_destroy\n\nIn alloc_inode, inode_init_always() could return -ENOMEM if\nsecurity_inode_alloc() fails, which causes inode-\u003ei_private\nuninitialized. Then nilfs_is_metadata_file_inode() returns\ntrue and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),\nwhich frees the uninitialized inode-\u003ei_private\nand leads to crashes(e.g., UAF/GPF).\n\nFix this by moving security_inode_alloc just prior to\nthis_cpu_inc(nr_inodes)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50367",
"url": "https://www.suse.com/security/cve/CVE-2022-50367"
},
{
"category": "external",
"summary": "SUSE Bug 1250277 for CVE-2022-50367",
"url": "https://bugzilla.suse.com/1250277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50367"
},
{
"cve": "CVE-2022-50368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50368"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dsi: fix memory corruption with too many bridges\n\nAdd the missing sanity check on the bridge counter to avoid corrupting\ndata beyond the fixed-sized bridge array in case there are ever more\nthan eight bridges.\n\nPatchwork: https://patchwork.freedesktop.org/patch/502668/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50368",
"url": "https://www.suse.com/security/cve/CVE-2022-50368"
},
{
"category": "external",
"summary": "SUSE Bug 1250009 for CVE-2022-50368",
"url": "https://bugzilla.suse.com/1250009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50368"
},
{
"cve": "CVE-2022-50375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50375"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown\n\nlpuart_dma_shutdown tears down lpuart dma, but lpuart_flush_buffer can\nstill occur which in turn tries to access dma apis if lpuart_dma_tx_use\nflag is true. At this point since dma is torn down, these dma apis can\nabort. Set lpuart_dma_tx_use and the corresponding rx flag\nlpuart_dma_rx_use to false in lpuart_dma_shutdown so that dmas are not\naccessed after they are relinquished.\n\nOtherwise, when try to kill btattach, kernel may panic. This patch may\nfix this issue.\nroot@imx8ulpevk:~# btattach -B /dev/ttyLP2 -S 115200\n^C[ 90.182296] Internal error: synchronous external abort: 96000210 [#1] PREEMPT SMP\n[ 90.189806] Modules linked in: moal(O) mlan(O)\n[ 90.194258] CPU: 0 PID: 503 Comm: btattach Tainted: G O 5.15.32-06136-g34eecdf2f9e4 #37\n[ 90.203554] Hardware name: NXP i.MX8ULP 9X9 EVK (DT)\n[ 90.208513] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 90.215470] pc : fsl_edma3_disable_request+0x8/0x60\n[ 90.220358] lr : fsl_edma3_terminate_all+0x34/0x20c\n[ 90.225237] sp : ffff800013f0bac0\n[ 90.228548] x29: ffff800013f0bac0 x28: 0000000000000001 x27: ffff000008404800\n[ 90.235681] x26: ffff000008404960 x25: ffff000008404a08 x24: ffff000008404a00\n[ 90.242813] x23: ffff000008404a60 x22: 0000000000000002 x21: 0000000000000000\n[ 90.249946] x20: ffff800013f0baf8 x19: ffff00000559c800 x18: 0000000000000000\n[ 90.257078] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n[ 90.264211] x14: 0000000000000003 x13: 0000000000000000 x12: 0000000000000040\n[ 90.271344] x11: ffff00000600c248 x10: ffff800013f0bb10 x9 : ffff000057bcb090\n[ 90.278477] x8 : fffffc0000241a08 x7 : ffff00000534ee00 x6 : ffff000008404804\n[ 90.285609] x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff0000055b3480\n[ 90.292742] x2 : ffff8000135c0000 x1 : ffff00000534ee00 x0 : ffff00000559c800\n[ 90.299876] Call trace:\n[ 90.302321] fsl_edma3_disable_request+0x8/0x60\n[ 90.306851] lpuart_flush_buffer+0x40/0x160\n[ 90.311037] uart_flush_buffer+0x88/0x120\n[ 90.315050] tty_driver_flush_buffer+0x20/0x30\n[ 90.319496] hci_uart_flush+0x44/0x90\n[ 90.323162] +0x34/0x12c\n[ 90.327253] tty_ldisc_close+0x38/0x70\n[ 90.331005] tty_ldisc_release+0xa8/0x190\n[ 90.335018] tty_release_struct+0x24/0x8c\n[ 90.339022] tty_release+0x3ec/0x4c0\n[ 90.342593] __fput+0x70/0x234\n[ 90.345652] ____fput+0x14/0x20\n[ 90.348790] task_work_run+0x84/0x17c\n[ 90.352455] do_exit+0x310/0x96c\n[ 90.355688] do_group_exit+0x3c/0xa0\n[ 90.359259] __arm64_sys_exit_group+0x1c/0x20\n[ 90.363609] invoke_syscall+0x48/0x114\n[ 90.367362] el0_svc_common.constprop.0+0xd4/0xfc\n[ 90.372068] do_el0_svc+0x2c/0x94\n[ 90.375379] el0_svc+0x28/0x80\n[ 90.378438] el0t_64_sync_handler+0xa8/0x130\n[ 90.382711] el0t_64_sync+0x1a0/0x1a4\n[ 90.386376] Code: 17ffffda d503201f d503233f f9409802 (b9400041)\n[ 90.392467] ---[ end trace 2f60524b4a43f1f6 ]---\n[ 90.397073] note: btattach[503] exited with preempt_count 1\n[ 90.402636] Fixing recursive fault but reboot is needed!",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50375",
"url": "https://www.suse.com/security/cve/CVE-2022-50375"
},
{
"category": "external",
"summary": "SUSE Bug 1250132 for CVE-2022-50375",
"url": "https://bugzilla.suse.com/1250132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50375"
},
{
"cve": "CVE-2022-50381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50381"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix a crash in mempool_free\n\nThere\u0027s a crash in mempool_free when running the lvm test\nshell/lvchange-rebuild-raid.sh.\n\nThe reason for the crash is this:\n* super_written calls atomic_dec_and_test(\u0026mddev-\u003epending_writes) and\n wake_up(\u0026mddev-\u003esb_wait). Then it calls rdev_dec_pending(rdev, mddev)\n and bio_put(bio).\n* so, the process that waited on sb_wait and that is woken up is racing\n with bio_put(bio).\n* if the process wins the race, it calls bioset_exit before bio_put(bio)\n is executed.\n* bio_put(bio) attempts to free a bio into a destroyed bio set - causing\n a crash in mempool_free.\n\nWe fix this bug by moving bio_put before atomic_dec_and_test.\n\nWe also move rdev_dec_pending before atomic_dec_and_test as suggested by\nNeil Brown.\n\nThe function md_end_flush has a similar bug - we must call bio_put before\nwe decrement the number of in-progress bios.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 11557f0067 P4D 11557f0067 PUD 0\n Oops: 0002 [#1] PREEMPT SMP\n CPU: 0 PID: 73 Comm: kworker/0:1 Not tainted 6.1.0-rc3 #5\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\n Workqueue: kdelayd flush_expired_bios [dm_delay]\n RIP: 0010:mempool_free+0x47/0x80\n Code: 48 89 ef 5b 5d ff e0 f3 c3 48 89 f7 e8 32 45 3f 00 48 63 53 08 48 89 c6 3b 53 04 7d 2d 48 8b 43 10 8d 4a 01 48 89 df 89 4b 08 \u003c48\u003e 89 2c d0 e8 b0 45 3f 00 48 8d 7b 30 5b 5d 31 c9 ba 01 00 00 00\n RSP: 0018:ffff88910036bda8 EFLAGS: 00010093\n RAX: 0000000000000000 RBX: ffff8891037b65d8 RCX: 0000000000000001\n RDX: 0000000000000000 RSI: 0000000000000202 RDI: ffff8891037b65d8\n RBP: ffff8891447ba240 R08: 0000000000012908 R09: 00000000003d0900\n R10: 0000000000000000 R11: 0000000000173544 R12: ffff889101a14000\n R13: ffff8891562ac300 R14: ffff889102b41440 R15: ffffe8ffffa00d05\n FS: 0000000000000000(0000) GS:ffff88942fa00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000001102e99000 CR4: 00000000000006b0\n Call Trace:\n \u003cTASK\u003e\n clone_endio+0xf4/0x1c0 [dm_mod]\n clone_endio+0xf4/0x1c0 [dm_mod]\n __submit_bio+0x76/0x120\n submit_bio_noacct_nocheck+0xb6/0x2a0\n flush_expired_bios+0x28/0x2f [dm_delay]\n process_one_work+0x1b4/0x300\n worker_thread+0x45/0x3e0\n ? rescuer_thread+0x380/0x380\n kthread+0xc2/0x100\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n Modules linked in: brd dm_delay dm_raid dm_mod af_packet uvesafb cfbfillrect cfbimgblt cn cfbcopyarea fb font fbdev tun autofs4 binfmt_misc configfs ipv6 virtio_rng virtio_balloon rng_core virtio_net pcspkr net_failover failover qemu_fw_cfg button mousedev raid10 raid456 libcrc32c async_raid6_recov async_memcpy async_pq raid6_pq async_xor xor async_tx raid1 raid0 md_mod sd_mod t10_pi crc64_rocksoft crc64 virtio_scsi scsi_mod evdev psmouse bsg scsi_common [last unloaded: brd]\n CR2: 0000000000000000\n ---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50381",
"url": "https://www.suse.com/security/cve/CVE-2022-50381"
},
{
"category": "external",
"summary": "SUSE Bug 1250257 for CVE-2022-50381",
"url": "https://bugzilla.suse.com/1250257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50381"
},
{
"cve": "CVE-2022-50385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50385"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix an Oops in nfs_d_automount()\n\nWhen mounting from a NFSv4 referral, path-\u003edentry can end up being a\nnegative dentry, so derive the struct nfs_server from the dentry\nitself instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50385",
"url": "https://www.suse.com/security/cve/CVE-2022-50385"
},
{
"category": "external",
"summary": "SUSE Bug 1250131 for CVE-2022-50385",
"url": "https://bugzilla.suse.com/1250131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50385"
},
{
"cve": "CVE-2022-50386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50386"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix user-after-free\n\nThis uses l2cap_chan_hold_unless_zero() after calling\n__l2cap_get_chan_blah() to prevent the following trace:\n\nBluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref\n*kref)\nBluetooth: chan 0000000023c4974d\nBluetooth: parent 00000000ae861c08\n==================================================================\nBUG: KASAN: use-after-free in __mutex_waiter_is_first\nkernel/locking/mutex.c:191 [inline]\nBUG: KASAN: use-after-free in __mutex_lock_common\nkernel/locking/mutex.c:671 [inline]\nBUG: KASAN: use-after-free in __mutex_lock+0x278/0x400\nkernel/locking/mutex.c:729\nRead of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50386",
"url": "https://www.suse.com/security/cve/CVE-2022-50386"
},
{
"category": "external",
"summary": "SUSE Bug 1250301 for CVE-2022-50386",
"url": "https://bugzilla.suse.com/1250301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50386"
},
{
"cve": "CVE-2022-50401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50401"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure\n\nOn error situation `clp-\u003ecl_cb_conn.cb_xprt` should not be given\na reference to the xprt otherwise both client cleanup and the\nerror handling path of the caller call to put it. Better to\ndelay handing over the reference to a later branch.\n\n[ 72.530665] refcount_t: underflow; use-after-free.\n[ 72.531933] WARNING: CPU: 0 PID: 173 at lib/refcount.c:28 refcount_warn_saturate+0xcf/0x120\n[ 72.533075] Modules linked in: nfsd(OE) nfsv4(OE) nfsv3(OE) nfs(OE) lockd(OE) compat_nfs_ssc(OE) nfs_acl(OE) rpcsec_gss_krb5(OE) auth_rpcgss(OE) rpcrdma(OE) dns_resolver fscache netfs grace rdma_cm iw_cm ib_cm sunrpc(OE) mlx5_ib mlx5_core mlxfw pci_hyperv_intf ib_uverbs ib_core xt_MASQUERADE nf_conntrack_netlink nft_counter xt_addrtype nft_compat br_netfilter bridge stp llc nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set overlay nf_tables nfnetlink crct10dif_pclmul crc32_pclmul ghash_clmulni_intel xfs serio_raw virtio_net virtio_blk net_failover failover fuse [last unloaded: sunrpc]\n[ 72.540389] CPU: 0 PID: 173 Comm: kworker/u16:5 Tainted: G OE 5.15.82-dan #1\n[ 72.541511] Hardware name: Red Hat KVM/RHEL-AV, BIOS 1.16.0-3.module+el8.7.0+1084+97b81f61 04/01/2014\n[ 72.542717] Workqueue: nfsd4_callbacks nfsd4_run_cb_work [nfsd]\n[ 72.543575] RIP: 0010:refcount_warn_saturate+0xcf/0x120\n[ 72.544299] Code: 55 00 0f 0b 5d e9 01 50 98 00 80 3d 75 9e 39 08 00 0f 85 74 ff ff ff 48 c7 c7 e8 d1 60 8e c6 05 61 9e 39 08 01 e8 f6 51 55 00 \u003c0f\u003e 0b 5d e9 d9 4f 98 00 80 3d 4b 9e 39 08 00 0f 85 4c ff ff ff 48\n[ 72.546666] RSP: 0018:ffffb3f841157cf0 EFLAGS: 00010286\n[ 72.547393] RAX: 0000000000000026 RBX: ffff89ac6231d478 RCX: 0000000000000000\n[ 72.548324] RDX: ffff89adb7c2c2c0 RSI: ffff89adb7c205c0 RDI: ffff89adb7c205c0\n[ 72.549271] RBP: ffffb3f841157cf0 R08: 0000000000000000 R09: c0000000ffefffff\n[ 72.550209] R10: 0000000000000001 R11: ffffb3f841157ad0 R12: ffff89ac6231d180\n[ 72.551142] R13: ffff89ac6231d478 R14: ffff89ac40c06180 R15: ffff89ac6231d4b0\n[ 72.552089] FS: 0000000000000000(0000) GS:ffff89adb7c00000(0000) knlGS:0000000000000000\n[ 72.553175] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 72.553934] CR2: 0000563a310506a8 CR3: 0000000109a66000 CR4: 0000000000350ef0\n[ 72.554874] Call Trace:\n[ 72.555278] \u003cTASK\u003e\n[ 72.555614] svc_xprt_put+0xaf/0xe0 [sunrpc]\n[ 72.556276] nfsd4_process_cb_update.isra.11+0xb7/0x410 [nfsd]\n[ 72.557087] ? update_load_avg+0x82/0x610\n[ 72.557652] ? cpuacct_charge+0x60/0x70\n[ 72.558212] ? dequeue_entity+0xdb/0x3e0\n[ 72.558765] ? queued_spin_unlock+0x9/0x20\n[ 72.559358] nfsd4_run_cb_work+0xfc/0x270 [nfsd]\n[ 72.560031] process_one_work+0x1df/0x390\n[ 72.560600] worker_thread+0x37/0x3b0\n[ 72.561644] ? process_one_work+0x390/0x390\n[ 72.562247] kthread+0x12f/0x150\n[ 72.562710] ? set_kthread_struct+0x50/0x50\n[ 72.563309] ret_from_fork+0x22/0x30\n[ 72.563818] \u003c/TASK\u003e\n[ 72.564189] ---[ end trace 031117b1c72ec616 ]---\n[ 72.566019] list_add corruption. next-\u003eprev should be prev (ffff89ac4977e538), but was ffff89ac4763e018. (next=ffff89ac4763e018).\n[ 72.567647] ------------[ cut here ]------------",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50401",
"url": "https://www.suse.com/security/cve/CVE-2022-50401"
},
{
"category": "external",
"summary": "SUSE Bug 1250140 for CVE-2022-50401",
"url": "https://bugzilla.suse.com/1250140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50401"
},
{
"cve": "CVE-2022-50408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50408"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()\n\n\u003e ret = brcmf_proto_tx_queue_data(drvr, ifp-\u003eifidx, skb);\n\nmay be schedule, and then complete before the line\n\n\u003e ndev-\u003estats.tx_bytes += skb-\u003elen;\n\n[ 46.912801] ==================================================================\n[ 46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[ 46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328\n[ 46.935991]\n[ 46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G O 5.4.199-[REDACTED] #1\n[ 46.947255] Hardware name: [REDACTED]\n[ 46.954568] Call trace:\n[ 46.957037] dump_backtrace+0x0/0x2b8\n[ 46.960719] show_stack+0x24/0x30\n[ 46.964052] dump_stack+0x128/0x194\n[ 46.967557] print_address_description.isra.0+0x64/0x380\n[ 46.972877] __kasan_report+0x1d4/0x240\n[ 46.976723] kasan_report+0xc/0x18\n[ 46.980138] __asan_report_load4_noabort+0x18/0x20\n[ 46.985027] brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[ 46.990613] dev_hard_start_xmit+0x1bc/0xda0\n[ 46.994894] sch_direct_xmit+0x198/0xd08\n[ 46.998827] __qdisc_run+0x37c/0x1dc0\n[ 47.002500] __dev_queue_xmit+0x1528/0x21f8\n[ 47.006692] dev_queue_xmit+0x24/0x30\n[ 47.010366] neigh_resolve_output+0x37c/0x678\n[ 47.014734] ip_finish_output2+0x598/0x2458\n[ 47.018927] __ip_finish_output+0x300/0x730\n[ 47.023118] ip_output+0x2e0/0x430\n[ 47.026530] ip_local_out+0x90/0x140\n[ 47.030117] igmpv3_sendpack+0x14c/0x228\n[ 47.034049] igmpv3_send_cr+0x384/0x6b8\n[ 47.037895] igmp_ifc_timer_expire+0x4c/0x118\n[ 47.042262] call_timer_fn+0x1cc/0xbe8\n[ 47.046021] __run_timers+0x4d8/0xb28\n[ 47.049693] run_timer_softirq+0x24/0x40\n[ 47.053626] __do_softirq+0x2c0/0x117c\n[ 47.057387] irq_exit+0x2dc/0x388\n[ 47.060715] __handle_domain_irq+0xb4/0x158\n[ 47.064908] gic_handle_irq+0x58/0xb0\n[ 47.068581] el0_irq_naked+0x50/0x5c\n[ 47.072162]\n[ 47.073665] Allocated by task 328:\n[ 47.077083] save_stack+0x24/0xb0\n[ 47.080410] __kasan_kmalloc.isra.0+0xc0/0xe0\n[ 47.084776] kasan_slab_alloc+0x14/0x20\n[ 47.088622] kmem_cache_alloc+0x15c/0x468\n[ 47.092643] __alloc_skb+0xa4/0x498\n[ 47.096142] igmpv3_newpack+0x158/0xd78\n[ 47.099987] add_grhead+0x210/0x288\n[ 47.103485] add_grec+0x6b0/0xb70\n[ 47.106811] igmpv3_send_cr+0x2e0/0x6b8\n[ 47.110657] igmp_ifc_timer_expire+0x4c/0x118\n[ 47.115027] call_timer_fn+0x1cc/0xbe8\n[ 47.118785] __run_timers+0x4d8/0xb28\n[ 47.122457] run_timer_softirq+0x24/0x40\n[ 47.126389] __do_softirq+0x2c0/0x117c\n[ 47.130142]\n[ 47.131643] Freed by task 180:\n[ 47.134712] save_stack+0x24/0xb0\n[ 47.138041] __kasan_slab_free+0x108/0x180\n[ 47.142146] kasan_slab_free+0x10/0x18\n[ 47.145904] slab_free_freelist_hook+0xa4/0x1b0\n[ 47.150444] kmem_cache_free+0x8c/0x528\n[ 47.154292] kfree_skbmem+0x94/0x108\n[ 47.157880] consume_skb+0x10c/0x5a8\n[ 47.161466] __dev_kfree_skb_any+0x88/0xa0\n[ 47.165598] brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]\n[ 47.171023] brcmf_txfinalize+0xec/0x190 [brcmfmac]\n[ 47.176016] brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]\n[ 47.182056] brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]\n[ 47.187568] brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]\n[ 47.192529] brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]\n[ 47.197859] process_one_work+0x7fc/0x1a80\n[ 47.201965] worker_thread+0x31c/0xc40\n[ 47.205726] kthread+0x2d8/0x370\n[ 47.208967] ret_from_fork+0x10/0x18\n[ 47.212546]\n[ 47.214051] The buggy address belongs to the object at ffffff803f588280\n[ 47.214051] which belongs to the cache skbuff_head_cache of size 208\n[ 47.227086] The buggy address is located 104 bytes inside of\n[ 47.227086] 208-byte region [ffffff803f588280, ffffff803f588350)\n[ 47.238814] The buggy address belongs to the page:\n[ 47.243618] page:ffffffff00dd6200 refcount:1 mapcou\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50408",
"url": "https://www.suse.com/security/cve/CVE-2022-50408"
},
{
"category": "external",
"summary": "SUSE Bug 1250391 for CVE-2022-50408",
"url": "https://bugzilla.suse.com/1250391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50408"
},
{
"cve": "CVE-2022-50409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50409"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: If sock is dead don\u0027t access sock\u0027s sk_wq in sk_stream_wait_memory\n\nFixes the below NULL pointer dereference:\n\n [...]\n [ 14.471200] Call Trace:\n [ 14.471562] \u003cTASK\u003e\n [ 14.471882] lock_acquire+0x245/0x2e0\n [ 14.472416] ? remove_wait_queue+0x12/0x50\n [ 14.473014] ? _raw_spin_lock_irqsave+0x17/0x50\n [ 14.473681] _raw_spin_lock_irqsave+0x3d/0x50\n [ 14.474318] ? remove_wait_queue+0x12/0x50\n [ 14.474907] remove_wait_queue+0x12/0x50\n [ 14.475480] sk_stream_wait_memory+0x20d/0x340\n [ 14.476127] ? do_wait_intr_irq+0x80/0x80\n [ 14.476704] do_tcp_sendpages+0x287/0x600\n [ 14.477283] tcp_bpf_push+0xab/0x260\n [ 14.477817] tcp_bpf_sendmsg_redir+0x297/0x500\n [ 14.478461] ? __local_bh_enable_ip+0x77/0xe0\n [ 14.479096] tcp_bpf_send_verdict+0x105/0x470\n [ 14.479729] tcp_bpf_sendmsg+0x318/0x4f0\n [ 14.480311] sock_sendmsg+0x2d/0x40\n [ 14.480822] ____sys_sendmsg+0x1b4/0x1c0\n [ 14.481390] ? copy_msghdr_from_user+0x62/0x80\n [ 14.482048] ___sys_sendmsg+0x78/0xb0\n [ 14.482580] ? vmf_insert_pfn_prot+0x91/0x150\n [ 14.483215] ? __do_fault+0x2a/0x1a0\n [ 14.483738] ? do_fault+0x15e/0x5d0\n [ 14.484246] ? __handle_mm_fault+0x56b/0x1040\n [ 14.484874] ? lock_is_held_type+0xdf/0x130\n [ 14.485474] ? find_held_lock+0x2d/0x90\n [ 14.486046] ? __sys_sendmsg+0x41/0x70\n [ 14.486587] __sys_sendmsg+0x41/0x70\n [ 14.487105] ? intel_pmu_drain_pebs_core+0x350/0x350\n [ 14.487822] do_syscall_64+0x34/0x80\n [ 14.488345] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n [...]\n\nThe test scenario has the following flow:\n\nthread1 thread2\n----------- ---------------\n tcp_bpf_sendmsg\n tcp_bpf_send_verdict\n tcp_bpf_sendmsg_redir sock_close\n tcp_bpf_push_locked __sock_release\n tcp_bpf_push //inet_release\n do_tcp_sendpages sock-\u003eops-\u003erelease\n sk_stream_wait_memory \t // tcp_close\n sk_wait_event sk-\u003esk_prot-\u003eclose\n release_sock(__sk);\n ***\n lock_sock(sk);\n __tcp_close\n sock_orphan(sk)\n sk-\u003esk_wq = NULL\n release_sock\n ****\n lock_sock(__sk);\n remove_wait_queue(sk_sleep(sk), \u0026wait);\n sk_sleep(sk)\n //NULL pointer dereference\n \u0026rcu_dereference_raw(sk-\u003esk_wq)-\u003ewait\n\nWhile waiting for memory in thread1, the socket is released with its wait\nqueue because thread2 has closed it. This caused by tcp_bpf_send_verdict\ndidn\u0027t increase the f_count of psock-\u003esk_redir-\u003esk_socket-\u003efile in thread1.\n\nWe should check if SOCK_DEAD flag is set on wakeup in sk_stream_wait_memory\nbefore accessing the wait queue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50409",
"url": "https://www.suse.com/security/cve/CVE-2022-50409"
},
{
"category": "external",
"summary": "SUSE Bug 1250392 for CVE-2022-50409",
"url": "https://bugzilla.suse.com/1250392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50409"
},
{
"cve": "CVE-2022-50410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50410"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Protect against send buffer overflow in NFSv2 READ\n\nSince before the git era, NFSD has conserved the number of pages\nheld by each nfsd thread by combining the RPC receive and send\nbuffers into a single array of pages. This works because there are\nno cases where an operation needs a large RPC Call message and a\nlarge RPC Reply at the same time.\n\nOnce an RPC Call has been received, svc_process() updates\nsvc_rqst::rq_res to describe the part of rq_pages that can be\nused for constructing the Reply. This means that the send buffer\n(rq_res) shrinks when the received RPC record containing the RPC\nCall is large.\n\nA client can force this shrinkage on TCP by sending a correctly-\nformed RPC Call header contained in an RPC record that is\nexcessively large. The full maximum payload size cannot be\nconstructed in that case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50410",
"url": "https://www.suse.com/security/cve/CVE-2022-50410"
},
{
"category": "external",
"summary": "SUSE Bug 1250187 for CVE-2022-50410",
"url": "https://bugzilla.suse.com/1250187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50410"
},
{
"cve": "CVE-2022-50412",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50412"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: bridge: adv7511: unregister cec i2c device after cec adapter\n\ncec_unregister_adapter() assumes that the underlying adapter ops are\ncallable. For example, if the CEC adapter currently has a valid physical\naddress, then the unregistration procedure will invalidate the physical\naddress by setting it to f.f.f.f. Whence the following kernel oops\nobserved after removing the adv7511 module:\n\n Unable to handle kernel execution of user memory at virtual address 0000000000000000\n Internal error: Oops: 86000004 [#1] PREEMPT_RT SMP\n Call trace:\n 0x0\n adv7511_cec_adap_log_addr+0x1ac/0x1c8 [adv7511]\n cec_adap_unconfigure+0x44/0x90 [cec]\n __cec_s_phys_addr.part.0+0x68/0x230 [cec]\n __cec_s_phys_addr+0x40/0x50 [cec]\n cec_unregister_adapter+0xb4/0x118 [cec]\n adv7511_remove+0x60/0x90 [adv7511]\n i2c_device_remove+0x34/0xe0\n device_release_driver_internal+0x114/0x1f0\n driver_detach+0x54/0xe0\n bus_remove_driver+0x60/0xd8\n driver_unregister+0x34/0x60\n i2c_del_driver+0x2c/0x68\n adv7511_exit+0x1c/0x67c [adv7511]\n __arm64_sys_delete_module+0x154/0x288\n invoke_syscall+0x48/0x100\n el0_svc_common.constprop.0+0x48/0xe8\n do_el0_svc+0x28/0x88\n el0_svc+0x1c/0x50\n el0t_64_sync_handler+0xa8/0xb0\n el0t_64_sync+0x15c/0x160\n Code: bad PC value\n ---[ end trace 0000000000000000 ]---\n\nProtect against this scenario by unregistering i2c_cec after\nunregistering the CEC adapter. Duly disable the CEC clock afterwards\ntoo.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50412",
"url": "https://www.suse.com/security/cve/CVE-2022-50412"
},
{
"category": "external",
"summary": "SUSE Bug 1250189 for CVE-2022-50412",
"url": "https://bugzilla.suse.com/1250189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50412"
},
{
"cve": "CVE-2022-50414",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50414"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: fcoe: Fix transport not deattached when fcoe_if_init() fails\n\nfcoe_init() calls fcoe_transport_attach(\u0026fcoe_sw_transport), but when\nfcoe_if_init() fails, \u0026fcoe_sw_transport is not detached and leaves freed\n\u0026fcoe_sw_transport on fcoe_transports list. This causes panic when\nreinserting module.\n\n BUG: unable to handle page fault for address: fffffbfff82e2213\n RIP: 0010:fcoe_transport_attach+0xe1/0x230 [libfcoe]\n Call Trace:\n \u003cTASK\u003e\n do_one_initcall+0xd0/0x4e0\n load_module+0x5eee/0x7210\n ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50414",
"url": "https://www.suse.com/security/cve/CVE-2022-50414"
},
{
"category": "external",
"summary": "SUSE Bug 1250183 for CVE-2022-50414",
"url": "https://bugzilla.suse.com/1250183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50414"
},
{
"cve": "CVE-2022-50419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50419"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sysfs: Fix attempting to call device_add multiple times\n\ndevice_add shall not be called multiple times as stated in its\ndocumentation:\n\n \u0027Do not call this routine or device_register() more than once for\n any device structure\u0027\n\nSyzkaller reports a bug as follows [1]:\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:33!\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN\n[...]\nCall Trace:\n \u003cTASK\u003e\n __list_add include/linux/list.h:69 [inline]\n list_add_tail include/linux/list.h:102 [inline]\n kobj_kset_join lib/kobject.c:164 [inline]\n kobject_add_internal+0x18f/0x8f0 lib/kobject.c:214\n kobject_add_varg lib/kobject.c:358 [inline]\n kobject_add+0x150/0x1c0 lib/kobject.c:410\n device_add+0x368/0x1e90 drivers/base/core.c:3452\n hci_conn_add_sysfs+0x9b/0x1b0 net/bluetooth/hci_sysfs.c:53\n hci_le_cis_estabilished_evt+0x57c/0xae0 net/bluetooth/hci_event.c:6799\n hci_le_meta_evt+0x2b8/0x510 net/bluetooth/hci_event.c:7110\n hci_event_func net/bluetooth/hci_event.c:7440 [inline]\n hci_event_packet+0x63d/0xfd0 net/bluetooth/hci_event.c:7495\n hci_rx_work+0xae7/0x1230 net/bluetooth/hci_core.c:4007\n process_one_work+0x991/0x1610 kernel/workqueue.c:2289\n worker_thread+0x665/0x1080 kernel/workqueue.c:2436\n kthread+0x2e4/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50419",
"url": "https://www.suse.com/security/cve/CVE-2022-50419"
},
{
"category": "external",
"summary": "SUSE Bug 1250394 for CVE-2022-50419",
"url": "https://bugzilla.suse.com/1250394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50419"
},
{
"cve": "CVE-2022-50422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50422"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libsas: Fix use-after-free bug in smp_execute_task_sg()\n\nWhen executing SMP task failed, the smp_execute_task_sg() calls del_timer()\nto delete \"slow_task-\u003etimer\". However, if the timer handler\nsas_task_internal_timedout() is running, the del_timer() in\nsmp_execute_task_sg() will not stop it and a UAF will happen. The process\nis shown below:\n\n (thread 1) | (thread 2)\nsmp_execute_task_sg() | sas_task_internal_timedout()\n ... |\n del_timer() |\n ... | ...\n sas_free_task(task) |\n kfree(task-\u003eslow_task) //FREE|\n | task-\u003eslow_task-\u003e... //USE\n\nFix by calling del_timer_sync() in smp_execute_task_sg(), which makes sure\nthe timer handler have finished before the \"task-\u003eslow_task\" is\ndeallocated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50422",
"url": "https://www.suse.com/security/cve/CVE-2022-50422"
},
{
"category": "external",
"summary": "SUSE Bug 1250774 for CVE-2022-50422",
"url": "https://bugzilla.suse.com/1250774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50422"
},
{
"cve": "CVE-2022-50427",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50427"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ac97: fix possible memory leak in snd_ac97_dev_register()\n\nIf device_register() fails in snd_ac97_dev_register(), it should\ncall put_device() to give up reference, or the name allocated in\ndev_set_name() is leaked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50427",
"url": "https://www.suse.com/security/cve/CVE-2022-50427"
},
{
"category": "external",
"summary": "SUSE Bug 1250787 for CVE-2022-50427",
"url": "https://bugzilla.suse.com/1250787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "low"
}
],
"title": "CVE-2022-50427"
},
{
"cve": "CVE-2022-50431",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50431"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()\n\ndev_set_name() in soundbus_add_one() allocates memory for name, it need be\nfreed when of_device_register() fails, call soundbus_dev_put() to give up\nthe reference that hold in device_initialize(), so that it can be freed in\nkobject_cleanup() when the refcount hit to 0. And other resources are also\nfreed in i2sbus_release_dev(), so it can return 0 directly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50431",
"url": "https://www.suse.com/security/cve/CVE-2022-50431"
},
{
"category": "external",
"summary": "SUSE Bug 1250790 for CVE-2022-50431",
"url": "https://bugzilla.suse.com/1250790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "low"
}
],
"title": "CVE-2022-50431"
},
{
"cve": "CVE-2022-50435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50435"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid crash when inline data creation follows DIO write\n\nWhen inode is created and written to using direct IO, there is nothing\nto clear the EXT4_STATE_MAY_INLINE_DATA flag. Thus when inode gets\ntruncated later to say 1 byte and written using normal write, we will\ntry to store the data as inline data. This confuses the code later\nbecause the inode now has both normal block and inline data allocated\nand the confusion manifests for example as:\n\nkernel BUG at fs/ext4/inode.c:2721!\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN\nCPU: 0 PID: 359 Comm: repro Not tainted 5.19.0-rc8-00001-g31ba1e3b8305-dirty #15\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-1.fc36 04/01/2014\nRIP: 0010:ext4_writepages+0x363d/0x3660\nRSP: 0018:ffffc90000ccf260 EFLAGS: 00010293\nRAX: ffffffff81e1abcd RBX: 0000008000000000 RCX: ffff88810842a180\nRDX: 0000000000000000 RSI: 0000008000000000 RDI: 0000000000000000\nRBP: ffffc90000ccf650 R08: ffffffff81e17d58 R09: ffffed10222c680b\nR10: dfffe910222c680c R11: 1ffff110222c680a R12: ffff888111634128\nR13: ffffc90000ccf880 R14: 0000008410000000 R15: 0000000000000001\nFS: 00007f72635d2640(0000) GS:ffff88811b000000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000565243379180 CR3: 000000010aa74000 CR4: 0000000000150eb0\nCall Trace:\n \u003cTASK\u003e\n do_writepages+0x397/0x640\n filemap_fdatawrite_wbc+0x151/0x1b0\n file_write_and_wait_range+0x1c9/0x2b0\n ext4_sync_file+0x19e/0xa00\n vfs_fsync_range+0x17b/0x190\n ext4_buffered_write_iter+0x488/0x530\n ext4_file_write_iter+0x449/0x1b90\n vfs_write+0xbcd/0xf40\n ksys_write+0x198/0x2c0\n __x64_sys_write+0x7b/0x90\n do_syscall_64+0x3d/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n \u003c/TASK\u003e\n\nFix the problem by clearing EXT4_STATE_MAY_INLINE_DATA when we are doing\ndirect IO write to a file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50435",
"url": "https://www.suse.com/security/cve/CVE-2022-50435"
},
{
"category": "external",
"summary": "SUSE Bug 1250799 for CVE-2022-50435",
"url": "https://bugzilla.suse.com/1250799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50435"
},
{
"cve": "CVE-2022-50437",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50437"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/hdmi: fix memory corruption with too many bridges\n\nAdd the missing sanity check on the bridge counter to avoid corrupting\ndata beyond the fixed-sized bridge array in case there are ever more\nthan eight bridges.\n\nPatchwork: https://patchwork.freedesktop.org/patch/502670/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50437",
"url": "https://www.suse.com/security/cve/CVE-2022-50437"
},
{
"category": "external",
"summary": "SUSE Bug 1250797 for CVE-2022-50437",
"url": "https://bugzilla.suse.com/1250797"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2022-50437"
},
{
"cve": "CVE-2022-50440",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50440"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Validate the box size for the snooped cursor\n\nInvalid userspace dma surface copies could potentially overflow\nthe memcpy from the surface to the snooped image leading to crashes.\nTo fix it the dimensions of the copybox have to be validated\nagainst the expected size of the snooped cursor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50440",
"url": "https://www.suse.com/security/cve/CVE-2022-50440"
},
{
"category": "external",
"summary": "SUSE Bug 1250853 for CVE-2022-50440",
"url": "https://bugzilla.suse.com/1250853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50440"
},
{
"cve": "CVE-2022-50444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50444"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: tegra20: Fix refcount leak in tegra20_clock_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50444",
"url": "https://www.suse.com/security/cve/CVE-2022-50444"
},
{
"category": "external",
"summary": "SUSE Bug 1250767 for CVE-2022-50444",
"url": "https://bugzilla.suse.com/1250767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50444"
},
{
"cve": "CVE-2022-50454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50454"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table()\n\nnouveau_bo_init() is backed by ttm_bo_init() and ferries its return code\nback to the caller. On failures, ttm will call nouveau_bo_del_ttm() and\nfree the memory.Thus, when nouveau_bo_init() returns an error, the gem\nobject has already been released. Then the call to nouveau_bo_ref() will\nuse the freed \"nvbo-\u003ebo\" and lead to a use-after-free bug.\n\nWe should delete the call to nouveau_bo_ref() to avoid the use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50454",
"url": "https://www.suse.com/security/cve/CVE-2022-50454"
},
{
"category": "external",
"summary": "SUSE Bug 1250890 for CVE-2022-50454",
"url": "https://bugzilla.suse.com/1250890"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50454"
},
{
"cve": "CVE-2022-50458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50458"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: tegra: Fix refcount leak in tegra210_clock_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50458",
"url": "https://www.suse.com/security/cve/CVE-2022-50458"
},
{
"category": "external",
"summary": "SUSE Bug 1250891 for CVE-2022-50458",
"url": "https://bugzilla.suse.com/1250891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50458"
},
{
"cve": "CVE-2022-50459",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50459"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername()\n\nFix a NULL pointer crash that occurs when we are freeing the socket at the\nsame time we access it via sysfs.\n\nThe problem is that:\n\n 1. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() take\n the frwd_lock and do sock_hold() then drop the frwd_lock. sock_hold()\n does a get on the \"struct sock\".\n\n 2. iscsi_sw_tcp_release_conn() does sockfd_put() which does the last put\n on the \"struct socket\" and that does __sock_release() which sets the\n sock-\u003eops to NULL.\n\n 3. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() then\n call kernel_getpeername() which accesses the NULL sock-\u003eops.\n\nAbove we do a get on the \"struct sock\", but we needed a get on the \"struct\nsocket\". Originally, we just held the frwd_lock the entire time but in\ncommit bcf3a2953d36 (\"scsi: iscsi: iscsi_tcp: Avoid holding spinlock while\ncalling getpeername()\") we switched to refcount based because the network\nlayer changed and started taking a mutex in that path, so we could no\nlonger hold the frwd_lock.\n\nInstead of trying to maintain multiple refcounts, this just has us use a\nmutex for accessing the socket in the interface code paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50459",
"url": "https://www.suse.com/security/cve/CVE-2022-50459"
},
{
"category": "external",
"summary": "SUSE Bug 1250850 for CVE-2022-50459",
"url": "https://bugzilla.suse.com/1250850"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50459"
},
{
"cve": "CVE-2022-50467",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50467"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID\n\nAn error case exit from lpfc_cmpl_ct_cmd_gft_id() results in a call to\nlpfc_nlp_put() with a null pointer to a nodelist structure.\n\nChanged lpfc_cmpl_ct_cmd_gft_id() to initialize nodelist pointer upon\nentry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50467",
"url": "https://www.suse.com/security/cve/CVE-2022-50467"
},
{
"category": "external",
"summary": "SUSE Bug 1250847 for CVE-2022-50467",
"url": "https://bugzilla.suse.com/1250847"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-50467"
},
{
"cve": "CVE-2023-1380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1380"
}
],
"notes": [
{
"category": "general",
"text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1380",
"url": "https://www.suse.com/security/cve/CVE-2023-1380"
},
{
"category": "external",
"summary": "SUSE Bug 1209287 for CVE-2023-1380",
"url": "https://bugzilla.suse.com/1209287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-28328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28328"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28328",
"url": "https://www.suse.com/security/cve/CVE-2023-28328"
},
{
"category": "external",
"summary": "SUSE Bug 1209291 for CVE-2023-28328",
"url": "https://bugzilla.suse.com/1209291"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-28328",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-31248",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-31248"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-31248",
"url": "https://www.suse.com/security/cve/CVE-2023-31248"
},
{
"category": "external",
"summary": "SUSE Bug 1213061 for CVE-2023-31248",
"url": "https://bugzilla.suse.com/1213061"
},
{
"category": "external",
"summary": "SUSE Bug 1213064 for CVE-2023-31248",
"url": "https://bugzilla.suse.com/1213064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2023-31248"
},
{
"cve": "CVE-2023-3772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3772"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3772",
"url": "https://www.suse.com/security/cve/CVE-2023-3772"
},
{
"category": "external",
"summary": "SUSE Bug 1213666 for CVE-2023-3772",
"url": "https://bugzilla.suse.com/1213666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-3772"
},
{
"cve": "CVE-2023-39197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39197"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39197",
"url": "https://www.suse.com/security/cve/CVE-2023-39197"
},
{
"category": "external",
"summary": "SUSE Bug 1216976 for CVE-2023-39197",
"url": "https://bugzilla.suse.com/1216976"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-39197",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-39197"
},
{
"cve": "CVE-2023-42753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42753"
}
],
"notes": [
{
"category": "general",
"text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42753",
"url": "https://www.suse.com/security/cve/CVE-2023-42753"
},
{
"category": "external",
"summary": "SUSE Bug 1215150 for CVE-2023-42753",
"url": "https://bugzilla.suse.com/1215150"
},
{
"category": "external",
"summary": "SUSE Bug 1218613 for CVE-2023-42753",
"url": "https://bugzilla.suse.com/1218613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-53147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53147"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: add NULL check in xfrm_update_ae_params\n\nNormally, x-\u003ereplay_esn and x-\u003epreplay_esn should be allocated at\nxfrm_alloc_replay_state_esn(...) in xfrm_state_construct(...), hence the\nxfrm_update_ae_params(...) is okay to update them. However, the current\nimplementation of xfrm_new_ae(...) allows a malicious user to directly\ndereference a NULL pointer and crash the kernel like below.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 8253067 P4D 8253067 PUD 8e0e067 PMD 0\nOops: 0002 [#1] PREEMPT SMP KASAN NOPTI\nCPU: 0 PID: 98 Comm: poc.npd Not tainted 6.4.0-rc7-00072-gdad9774deaf1 #8\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.o4\nRIP: 0010:memcpy_orig+0xad/0x140\nCode: e8 4c 89 5f e0 48 8d 7f e0 73 d2 83 c2 20 48 29 d6 48 29 d7 83 fa 10 72 34 4c 8b 06 4c 8b 4e 08 c\nRSP: 0018:ffff888008f57658 EFLAGS: 00000202\nRAX: 0000000000000000 RBX: ffff888008bd0000 RCX: ffffffff8238e571\nRDX: 0000000000000018 RSI: ffff888007f64844 RDI: 0000000000000000\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: ffff888008f57818\nR13: ffff888007f64aa4 R14: 0000000000000000 R15: 0000000000000000\nFS: 00000000014013c0(0000) GS:ffff88806d600000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000000 CR3: 00000000054d8000 CR4: 00000000000006f0\nCall Trace:\n \u003cTASK\u003e\n ? __die+0x1f/0x70\n ? page_fault_oops+0x1e8/0x500\n ? __pfx_is_prefetch.constprop.0+0x10/0x10\n ? __pfx_page_fault_oops+0x10/0x10\n ? _raw_spin_unlock_irqrestore+0x11/0x40\n ? fixup_exception+0x36/0x460\n ? _raw_spin_unlock_irqrestore+0x11/0x40\n ? exc_page_fault+0x5e/0xc0\n ? asm_exc_page_fault+0x26/0x30\n ? xfrm_update_ae_params+0xd1/0x260\n ? memcpy_orig+0xad/0x140\n ? __pfx__raw_spin_lock_bh+0x10/0x10\n xfrm_update_ae_params+0xe7/0x260\n xfrm_new_ae+0x298/0x4e0\n ? __pfx_xfrm_new_ae+0x10/0x10\n ? __pfx_xfrm_new_ae+0x10/0x10\n xfrm_user_rcv_msg+0x25a/0x410\n ? __pfx_xfrm_user_rcv_msg+0x10/0x10\n ? __alloc_skb+0xcf/0x210\n ? stack_trace_save+0x90/0xd0\n ? filter_irq_stacks+0x1c/0x70\n ? __stack_depot_save+0x39/0x4e0\n ? __kasan_slab_free+0x10a/0x190\n ? kmem_cache_free+0x9c/0x340\n ? netlink_recvmsg+0x23c/0x660\n ? sock_recvmsg+0xeb/0xf0\n ? __sys_recvfrom+0x13c/0x1f0\n ? __x64_sys_recvfrom+0x71/0x90\n ? do_syscall_64+0x3f/0x90\n ? entry_SYSCALL_64_after_hwframe+0x72/0xdc\n ? copyout+0x3e/0x50\n netlink_rcv_skb+0xd6/0x210\n ? __pfx_xfrm_user_rcv_msg+0x10/0x10\n ? __pfx_netlink_rcv_skb+0x10/0x10\n ? __pfx_sock_has_perm+0x10/0x10\n ? mutex_lock+0x8d/0xe0\n ? __pfx_mutex_lock+0x10/0x10\n xfrm_netlink_rcv+0x44/0x50\n netlink_unicast+0x36f/0x4c0\n ? __pfx_netlink_unicast+0x10/0x10\n ? netlink_recvmsg+0x500/0x660\n netlink_sendmsg+0x3b7/0x700\n\nThis Null-ptr-deref bug is assigned CVE-2023-3772. And this commit\nadds additional NULL check in xfrm_update_ae_params to fix the NPD.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53147",
"url": "https://www.suse.com/security/cve/CVE-2023-53147"
},
{
"category": "external",
"summary": "SUSE Bug 1249880 for CVE-2023-53147",
"url": "https://bugzilla.suse.com/1249880"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53147"
},
{
"cve": "CVE-2023-53178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix zswap writeback race condition\n\nThe zswap writeback mechanism can cause a race condition resulting in\nmemory corruption, where a swapped out page gets swapped in with data that\nwas written to a different page.\n\nThe race unfolds like this:\n1. a page with data A and swap offset X is stored in zswap\n2. page A is removed off the LRU by zpool driver for writeback in\n zswap-shrink work, data for A is mapped by zpool driver\n3. user space program faults and invalidates page entry A, offset X is\n considered free\n4. kswapd stores page B at offset X in zswap (zswap could also be\n full, if so, page B would then be IOed to X, then skip step 5.)\n5. entry A is replaced by B in tree-\u003erbroot, this doesn\u0027t affect the\n local reference held by zswap-shrink work\n6. zswap-shrink work writes back A at X, and frees zswap entry A\n7. swapin of slot X brings A in memory instead of B\n\nThe fix:\nOnce the swap page cache has been allocated (case ZSWAP_SWAPCACHE_NEW),\nzswap-shrink work just checks that the local zswap_entry reference is\nstill the same as the one in the tree. If it\u0027s not the same it means that\nit\u0027s either been invalidated or replaced, in both cases the writeback is\naborted because the local entry contains stale data.\n\nReproducer:\nI originally found this by running `stress` overnight to validate my work\non the zswap writeback mechanism, it manifested after hours on my test\nmachine. The key to make it happen is having zswap writebacks, so\nwhatever setup pumps /sys/kernel/debug/zswap/written_back_pages should do\nthe trick.\n\nIn order to reproduce this faster on a vm, I setup a system with ~100M of\navailable memory and a 500M swap file, then running `stress --vm 1\n--vm-bytes 300000000 --vm-stride 4000` makes it happen in matter of tens\nof minutes. One can speed things up even more by swinging\n/sys/module/zswap/parameters/max_pool_percent up and down between, say, 20\nand 1; this makes it reproduce in tens of seconds. It\u0027s crucial to set\n`--vm-stride` to something other than 4096 otherwise `stress` won\u0027t\nrealize that memory has been corrupted because all pages would have the\nsame data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53178",
"url": "https://www.suse.com/security/cve/CVE-2023-53178"
},
{
"category": "external",
"summary": "SUSE Bug 1249827 for CVE-2023-53178",
"url": "https://bugzilla.suse.com/1249827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53178"
},
{
"cve": "CVE-2023-53179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c\n\nThe missing IP_SET_HASH_WITH_NET0 macro in ip_set_hash_netportnet can\nlead to the use of wrong `CIDR_POS(c)` for calculating array offsets,\nwhich can lead to integer underflow. As a result, it leads to slab\nout-of-bound access.\nThis patch adds back the IP_SET_HASH_WITH_NET0 macro to\nip_set_hash_netportnet to address the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53179",
"url": "https://www.suse.com/security/cve/CVE-2023-53179"
},
{
"category": "external",
"summary": "SUSE Bug 1249825 for CVE-2023-53179",
"url": "https://bugzilla.suse.com/1249825"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53179"
},
{
"cve": "CVE-2023-53213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53213"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()\n\nFix a slab-out-of-bounds read that occurs in kmemdup() called from\nbrcmf_get_assoc_ies().\nThe bug could occur when assoc_info-\u003ereq_len, data from a URB provided\nby a USB device, is bigger than the size of buffer which is defined as\nWL_EXTRA_BUF_MAX.\n\nAdd the size check for req_len/resp_len of assoc_info.\n\nFound by a modified version of syzkaller.\n\n[ 46.592467][ T7] ==================================================================\n[ 46.594687][ T7] BUG: KASAN: slab-out-of-bounds in kmemdup+0x3e/0x50\n[ 46.596572][ T7] Read of size 3014656 at addr ffff888019442000 by task kworker/0:1/7\n[ 46.598575][ T7]\n[ 46.599157][ T7] CPU: 0 PID: 7 Comm: kworker/0:1 Tainted: G O 5.14.0+ #145\n[ 46.601333][ T7] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\n[ 46.604360][ T7] Workqueue: events brcmf_fweh_event_worker\n[ 46.605943][ T7] Call Trace:\n[ 46.606584][ T7] dump_stack_lvl+0x8e/0xd1\n[ 46.607446][ T7] print_address_description.constprop.0.cold+0x93/0x334\n[ 46.608610][ T7] ? kmemdup+0x3e/0x50\n[ 46.609341][ T7] kasan_report.cold+0x79/0xd5\n[ 46.610151][ T7] ? kmemdup+0x3e/0x50\n[ 46.610796][ T7] kasan_check_range+0x14e/0x1b0\n[ 46.611691][ T7] memcpy+0x20/0x60\n[ 46.612323][ T7] kmemdup+0x3e/0x50\n[ 46.612987][ T7] brcmf_get_assoc_ies+0x967/0xf60\n[ 46.613904][ T7] ? brcmf_notify_vif_event+0x3d0/0x3d0\n[ 46.614831][ T7] ? lock_chain_count+0x20/0x20\n[ 46.615683][ T7] ? mark_lock.part.0+0xfc/0x2770\n[ 46.616552][ T7] ? lock_chain_count+0x20/0x20\n[ 46.617409][ T7] ? mark_lock.part.0+0xfc/0x2770\n[ 46.618244][ T7] ? lock_chain_count+0x20/0x20\n[ 46.619024][ T7] brcmf_bss_connect_done.constprop.0+0x241/0x2e0\n[ 46.620019][ T7] ? brcmf_parse_configure_security.isra.0+0x2a0/0x2a0\n[ 46.620818][ T7] ? __lock_acquire+0x181f/0x5790\n[ 46.621462][ T7] brcmf_notify_connect_status+0x448/0x1950\n[ 46.622134][ T7] ? rcu_read_lock_bh_held+0xb0/0xb0\n[ 46.622736][ T7] ? brcmf_cfg80211_join_ibss+0x7b0/0x7b0\n[ 46.623390][ T7] ? find_held_lock+0x2d/0x110\n[ 46.623962][ T7] ? brcmf_fweh_event_worker+0x19f/0xc60\n[ 46.624603][ T7] ? mark_held_locks+0x9f/0xe0\n[ 46.625145][ T7] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0\n[ 46.625871][ T7] ? brcmf_cfg80211_join_ibss+0x7b0/0x7b0\n[ 46.626545][ T7] brcmf_fweh_call_event_handler.isra.0+0x90/0x100\n[ 46.627338][ T7] brcmf_fweh_event_worker+0x557/0xc60\n[ 46.627962][ T7] ? brcmf_fweh_call_event_handler.isra.0+0x100/0x100\n[ 46.628736][ T7] ? rcu_read_lock_sched_held+0xa1/0xd0\n[ 46.629396][ T7] ? rcu_read_lock_bh_held+0xb0/0xb0\n[ 46.629970][ T7] ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n[ 46.630649][ T7] process_one_work+0x92b/0x1460\n[ 46.631205][ T7] ? pwq_dec_nr_in_flight+0x330/0x330\n[ 46.631821][ T7] ? rwlock_bug.part.0+0x90/0x90\n[ 46.632347][ T7] worker_thread+0x95/0xe00\n[ 46.632832][ T7] ? __kthread_parkme+0x115/0x1e0\n[ 46.633393][ T7] ? process_one_work+0x1460/0x1460\n[ 46.633957][ T7] kthread+0x3a1/0x480\n[ 46.634369][ T7] ? set_kthread_struct+0x120/0x120\n[ 46.634933][ T7] ret_from_fork+0x1f/0x30\n[ 46.635431][ T7]\n[ 46.635687][ T7] Allocated by task 7:\n[ 46.636151][ T7] kasan_save_stack+0x1b/0x40\n[ 46.636628][ T7] __kasan_kmalloc+0x7c/0x90\n[ 46.637108][ T7] kmem_cache_alloc_trace+0x19e/0x330\n[ 46.637696][ T7] brcmf_cfg80211_attach+0x4a0/0x4040\n[ 46.638275][ T7] brcmf_attach+0x389/0xd40\n[ 46.638739][ T7] brcmf_usb_probe+0x12de/0x1690\n[ 46.639279][ T7] usb_probe_interface+0x2aa/0x760\n[ 46.639820][ T7] really_probe+0x205/0xb70\n[ 46.640342][ T7] __driver_probe_device+0\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53213",
"url": "https://www.suse.com/security/cve/CVE-2023-53213"
},
{
"category": "external",
"summary": "SUSE Bug 1249918 for CVE-2023-53213",
"url": "https://bugzilla.suse.com/1249918"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53213"
},
{
"cve": "CVE-2023-53220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53220"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: az6007: Fix null-ptr-deref in az6007_i2c_xfer()\n\nIn az6007_i2c_xfer, msg is controlled by user. When msg[i].buf\nis null and msg[i].len is zero, former checks on msg[i].buf would be\npassed. Malicious data finally reach az6007_i2c_xfer. If accessing\nmsg[i].buf[0] without sanity check, null ptr deref would happen.\nWe add check on msg[i].len to prevent crash.\n\nSimilar commit:\ncommit 0ed554fd769a\n(\"media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53220",
"url": "https://www.suse.com/security/cve/CVE-2023-53220"
},
{
"category": "external",
"summary": "SUSE Bug 1250337 for CVE-2023-53220",
"url": "https://bugzilla.suse.com/1250337"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53220"
},
{
"cve": "CVE-2023-53265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53265"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nubi: ensure that VID header offset + VID header size \u003c= alloc, size\n\nEnsure that the VID header offset + VID header size does not exceed\nthe allocated area to avoid slab OOB.\n\nBUG: KASAN: slab-out-of-bounds in crc32_body lib/crc32.c:111 [inline]\nBUG: KASAN: slab-out-of-bounds in crc32_le_generic lib/crc32.c:179 [inline]\nBUG: KASAN: slab-out-of-bounds in crc32_le_base+0x58c/0x626 lib/crc32.c:197\nRead of size 4 at addr ffff88802bb36f00 by task syz-executor136/1555\n\nCPU: 2 PID: 1555 Comm: syz-executor136 Tainted: G W\n6.0.0-1868 #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2.module+el8.3.0+7860+a7792d29\n04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x85/0xad lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:317 [inline]\n print_report.cold.13+0xb6/0x6bb mm/kasan/report.c:433\n kasan_report+0xa7/0x11b mm/kasan/report.c:495\n crc32_body lib/crc32.c:111 [inline]\n crc32_le_generic lib/crc32.c:179 [inline]\n crc32_le_base+0x58c/0x626 lib/crc32.c:197\n ubi_io_write_vid_hdr+0x1b7/0x472 drivers/mtd/ubi/io.c:1067\n create_vtbl+0x4d5/0x9c4 drivers/mtd/ubi/vtbl.c:317\n create_empty_lvol drivers/mtd/ubi/vtbl.c:500 [inline]\n ubi_read_volume_table+0x67b/0x288a drivers/mtd/ubi/vtbl.c:812\n ubi_attach+0xf34/0x1603 drivers/mtd/ubi/attach.c:1601\n ubi_attach_mtd_dev+0x6f3/0x185e drivers/mtd/ubi/build.c:965\n ctrl_cdev_ioctl+0x2db/0x347 drivers/mtd/ubi/cdev.c:1043\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x193/0x213 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3e/0x86 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0x0\nRIP: 0033:0x7f96d5cf753d\nCode:\nRSP: 002b:00007fffd72206f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f96d5cf753d\nRDX: 0000000020000080 RSI: 0000000040186f40 RDI: 0000000000000003\nRBP: 0000000000400cd0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000400be0\nR13: 00007fffd72207e0 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\n\nAllocated by task 1555:\n kasan_save_stack+0x20/0x3d mm/kasan/common.c:38\n kasan_set_track mm/kasan/common.c:45 [inline]\n set_alloc_info mm/kasan/common.c:437 [inline]\n ____kasan_kmalloc mm/kasan/common.c:516 [inline]\n __kasan_kmalloc+0x88/0xa3 mm/kasan/common.c:525\n kasan_kmalloc include/linux/kasan.h:234 [inline]\n __kmalloc+0x138/0x257 mm/slub.c:4429\n kmalloc include/linux/slab.h:605 [inline]\n ubi_alloc_vid_buf drivers/mtd/ubi/ubi.h:1093 [inline]\n create_vtbl+0xcc/0x9c4 drivers/mtd/ubi/vtbl.c:295\n create_empty_lvol drivers/mtd/ubi/vtbl.c:500 [inline]\n ubi_read_volume_table+0x67b/0x288a drivers/mtd/ubi/vtbl.c:812\n ubi_attach+0xf34/0x1603 drivers/mtd/ubi/attach.c:1601\n ubi_attach_mtd_dev+0x6f3/0x185e drivers/mtd/ubi/build.c:965\n ctrl_cdev_ioctl+0x2db/0x347 drivers/mtd/ubi/cdev.c:1043\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x193/0x213 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3e/0x86 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0x0\n\nThe buggy address belongs to the object at ffff88802bb36e00\n which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n 256-byte region [ffff88802bb36e00, ffff88802bb36f00)\n\nThe buggy address belongs to the physical page:\npage:00000000ea4d1263 refcount:1 mapcount:0 mapping:0000000000000000\nindex:0x0 pfn:0x2bb36\nhead:00000000ea4d1263 order:1 compound_mapcount:0 compound_pincount:0\nflags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff)\nraw: 000fffffc0010200 ffffea000066c300 dead000000000003 ffff888100042b40\nraw: 0000000000000000 00000000001\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53265",
"url": "https://www.suse.com/security/cve/CVE-2023-53265"
},
{
"category": "external",
"summary": "SUSE Bug 1249908 for CVE-2023-53265",
"url": "https://bugzilla.suse.com/1249908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53265"
},
{
"cve": "CVE-2023-53273",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53273"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nDrivers: vmbus: Check for channel allocation before looking up relids\n\nrelid2channel() assumes vmbus channel array to be allocated when called.\nHowever, in cases such as kdump/kexec, not all relids will be reset by the host.\nWhen the second kernel boots and if the guest receives a vmbus interrupt during\nvmbus driver initialization before vmbus_connect() is called, before it finishes,\nor if it fails, the vmbus interrupt service routine is called which in turn calls\nrelid2channel() and can cause a null pointer dereference.\n\nPrint a warning and error out in relid2channel() for a channel id that\u0027s invalid\nin the second kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53273",
"url": "https://www.suse.com/security/cve/CVE-2023-53273"
},
{
"category": "external",
"summary": "SUSE Bug 1249930 for CVE-2023-53273",
"url": "https://bugzilla.suse.com/1249930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53273"
},
{
"cve": "CVE-2023-53304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53304"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_rbtree: fix overlap expiration walk\n\nThe lazy gc on insert that should remove timed-out entries fails to release\nthe other half of the interval, if any.\n\nCan be reproduced with tests/shell/testcases/sets/0044interval_overlap_0\nin nftables.git and kmemleak enabled kernel.\n\nSecond bug is the use of rbe_prev vs. prev pointer.\nIf rbe_prev() returns NULL after at least one iteration, rbe_prev points\nto element that is not an end interval, hence it should not be removed.\n\nLastly, check the genmask of the end interval if this is active in the\ncurrent generation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53304",
"url": "https://www.suse.com/security/cve/CVE-2023-53304"
},
{
"category": "external",
"summary": "SUSE Bug 1249923 for CVE-2023-53304",
"url": "https://bugzilla.suse.com/1249923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53304"
},
{
"cve": "CVE-2023-53321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211_hwsim: drop short frames\n\nWhile technically some control frames like ACK are shorter and\nend after Address 1, such frames shouldn\u0027t be forwarded through\nwmediumd or similar userspace, so require the full 3-address\nheader to avoid accessing invalid memory if shorter frames are\npassed in.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53321",
"url": "https://www.suse.com/security/cve/CVE-2023-53321"
},
{
"category": "external",
"summary": "SUSE Bug 1250313 for CVE-2023-53321",
"url": "https://bugzilla.suse.com/1250313"
},
{
"category": "external",
"summary": "SUSE Bug 1250314 for CVE-2023-53321",
"url": "https://bugzilla.suse.com/1250314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2023-53321"
},
{
"cve": "CVE-2023-53333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one\n\nEric Dumazet says:\n nf_conntrack_dccp_packet() has an unique:\n\n dh = skb_header_pointer(skb, dataoff, sizeof(_dh), \u0026_dh);\n\n And nothing more is \u0027pulled\u0027 from the packet, depending on the content.\n dh-\u003edccph_doff, and/or dh-\u003edccph_x ...)\n So dccp_ack_seq() is happily reading stuff past the _dh buffer.\n\nBUG: KASAN: stack-out-of-bounds in nf_conntrack_dccp_packet+0x1134/0x11c0\nRead of size 4 at addr ffff000128f66e0c by task syz-executor.2/29371\n[..]\n\nFix this by increasing the stack buffer to also include room for\nthe extra sequence numbers and all the known dccp packet type headers,\nthen pull again after the initial validation of the basic header.\n\nWhile at it, mark packets invalid that lack 48bit sequence bit but\nwhere RFC says the type MUST use them.\n\nCompile tested only.\n\nv2: first skb_header_pointer() now needs to adjust the size to\n only pull the generic header. (Eric)\n\nHeads-up: I intend to remove dccp conntrack support later this year.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53333",
"url": "https://www.suse.com/security/cve/CVE-2023-53333"
},
{
"category": "external",
"summary": "SUSE Bug 1249949 for CVE-2023-53333",
"url": "https://bugzilla.suse.com/1249949"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53333"
},
{
"cve": "CVE-2023-53438",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53438"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/MCE: Always save CS register on AMD Zen IF Poison errors\n\nThe Instruction Fetch (IF) units on current AMD Zen-based systems do not\nguarantee a synchronous #MC is delivered for poison consumption errors.\nTherefore, MCG_STATUS[EIPV|RIPV] will not be set. However, the\nmicroarchitecture does guarantee that the exception is delivered within\nthe same context. In other words, the exact rIP is not known, but the\ncontext is known to not have changed.\n\nThere is no architecturally-defined method to determine this behavior.\n\nThe Code Segment (CS) register is always valid on such IF unit poison\nerrors regardless of the value of MCG_STATUS[EIPV|RIPV].\n\nAdd a quirk to save the CS register for poison consumption from the IF\nunit banks.\n\nThis is needed to properly determine the context of the error.\nOtherwise, the severity grading function will assume the context is\nIN_KERNEL due to the m-\u003ecs value being 0 (the initialized value). This\nleads to unnecessary kernel panics on data poison errors due to the\nkernel believing the poison consumption occurred in kernel context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53438",
"url": "https://www.suse.com/security/cve/CVE-2023-53438"
},
{
"category": "external",
"summary": "SUSE Bug 1250180 for CVE-2023-53438",
"url": "https://bugzilla.suse.com/1250180"
},
{
"category": "external",
"summary": "SUSE Bug 1250708 for CVE-2023-53438",
"url": "https://bugzilla.suse.com/1250708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53438"
},
{
"cve": "CVE-2023-53464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53464"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()\n\nThe validity of sock should be checked before assignment to avoid incorrect\nvalues. Commit 57569c37f0ad (\"scsi: iscsi: iscsi_tcp: Fix null-ptr-deref\nwhile calling getpeername()\") introduced this change which may lead to\ninconsistent values of tcp_sw_conn-\u003esendpage and conn-\u003edatadgst_en.\n\nFix the issue by moving the position of the assignment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53464",
"url": "https://www.suse.com/security/cve/CVE-2023-53464"
},
{
"category": "external",
"summary": "SUSE Bug 1250868 for CVE-2023-53464",
"url": "https://bugzilla.suse.com/1250868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53464"
},
{
"cve": "CVE-2023-53492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53492"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not ignore genmask when looking up chain by id\n\nWhen adding a rule to a chain referring to its ID, if that chain had been\ndeleted on the same batch, the rule might end up referring to a deleted\nchain.\n\nThis will lead to a WARNING like following:\n\n[ 33.098431] ------------[ cut here ]------------\n[ 33.098678] WARNING: CPU: 5 PID: 69 at net/netfilter/nf_tables_api.c:2037 nf_tables_chain_destroy+0x23d/0x260\n[ 33.099217] Modules linked in:\n[ 33.099388] CPU: 5 PID: 69 Comm: kworker/5:1 Not tainted 6.4.0+ #409\n[ 33.099726] Workqueue: events nf_tables_trans_destroy_work\n[ 33.100018] RIP: 0010:nf_tables_chain_destroy+0x23d/0x260\n[ 33.100306] Code: 8b 7c 24 68 e8 64 9c ed fe 4c 89 e7 e8 5c 9c ed fe 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 89 c6 89 c7 c3 cc cc cc cc \u003c0f\u003e 0b 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 89 c6 89 c7\n[ 33.101271] RSP: 0018:ffffc900004ffc48 EFLAGS: 00010202\n[ 33.101546] RAX: 0000000000000001 RBX: ffff888006fc0a28 RCX: 0000000000000000\n[ 33.101920] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n[ 33.102649] RBP: ffffc900004ffc78 R08: 0000000000000000 R09: 0000000000000000\n[ 33.103018] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880135ef500\n[ 33.103385] R13: 0000000000000000 R14: dead000000000122 R15: ffff888006fc0a10\n[ 33.103762] FS: 0000000000000000(0000) GS:ffff888024c80000(0000) knlGS:0000000000000000\n[ 33.104184] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 33.104493] CR2: 00007fe863b56a50 CR3: 00000000124b0001 CR4: 0000000000770ee0\n[ 33.104872] PKRU: 55555554\n[ 33.104999] Call Trace:\n[ 33.105113] \u003cTASK\u003e\n[ 33.105214] ? show_regs+0x72/0x90\n[ 33.105371] ? __warn+0xa5/0x210\n[ 33.105520] ? nf_tables_chain_destroy+0x23d/0x260\n[ 33.105732] ? report_bug+0x1f2/0x200\n[ 33.105902] ? handle_bug+0x46/0x90\n[ 33.106546] ? exc_invalid_op+0x19/0x50\n[ 33.106762] ? asm_exc_invalid_op+0x1b/0x20\n[ 33.106995] ? nf_tables_chain_destroy+0x23d/0x260\n[ 33.107249] ? nf_tables_chain_destroy+0x30/0x260\n[ 33.107506] nf_tables_trans_destroy_work+0x669/0x680\n[ 33.107782] ? mark_held_locks+0x28/0xa0\n[ 33.107996] ? __pfx_nf_tables_trans_destroy_work+0x10/0x10\n[ 33.108294] ? _raw_spin_unlock_irq+0x28/0x70\n[ 33.108538] process_one_work+0x68c/0xb70\n[ 33.108755] ? lock_acquire+0x17f/0x420\n[ 33.108977] ? __pfx_process_one_work+0x10/0x10\n[ 33.109218] ? do_raw_spin_lock+0x128/0x1d0\n[ 33.109435] ? _raw_spin_lock_irq+0x71/0x80\n[ 33.109634] worker_thread+0x2bd/0x700\n[ 33.109817] ? __pfx_worker_thread+0x10/0x10\n[ 33.110254] kthread+0x18b/0x1d0\n[ 33.110410] ? __pfx_kthread+0x10/0x10\n[ 33.110581] ret_from_fork+0x29/0x50\n[ 33.110757] \u003c/TASK\u003e\n[ 33.110866] irq event stamp: 1651\n[ 33.111017] hardirqs last enabled at (1659): [\u003cffffffffa206a209\u003e] __up_console_sem+0x79/0xa0\n[ 33.111379] hardirqs last disabled at (1666): [\u003cffffffffa206a1ee\u003e] __up_console_sem+0x5e/0xa0\n[ 33.111740] softirqs last enabled at (1616): [\u003cffffffffa1f5d40e\u003e] __irq_exit_rcu+0x9e/0xe0\n[ 33.112094] softirqs last disabled at (1367): [\u003cffffffffa1f5d40e\u003e] __irq_exit_rcu+0x9e/0xe0\n[ 33.112453] ---[ end trace 0000000000000000 ]---\n\nThis is due to the nft_chain_lookup_byid ignoring the genmask. After this\nchange, adding the new rule will fail as it will not find the chain.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53492",
"url": "https://www.suse.com/security/cve/CVE-2023-53492"
},
{
"category": "external",
"summary": "SUSE Bug 1250823 for CVE-2023-53492",
"url": "https://bugzilla.suse.com/1250823"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2023-53492"
},
{
"cve": "CVE-2024-26583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26583"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between async notify and socket close\n\nThe submitting thread (one which called recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete()\nso any code past that point risks touching already freed data.\n\nTry to avoid the locking and extra flags altogether.\nHave the main thread hold an extra reference, this way\nwe can depend solely on the atomic ref counter for\nsynchronization.\n\nDon\u0027t futz with reiniting the completion, either, we are now\ntightly controlling when completion fires.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26583",
"url": "https://www.suse.com/security/cve/CVE-2024-26583"
},
{
"category": "external",
"summary": "SUSE Bug 1220185 for CVE-2024-26583",
"url": "https://bugzilla.suse.com/1220185"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2024-26583"
},
{
"cve": "CVE-2024-26584",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26584"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tls: handle backlogging of crypto requests\n\nSince we\u0027re setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our\nrequests to the crypto API, crypto_aead_{encrypt,decrypt} can return\n -EBUSY instead of -EINPROGRESS in valid situations. For example, when\nthe cryptd queue for AESNI is full (easy to trigger with an\nartificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued\nto the backlog but still processed. In that case, the async callback\nwill also be called twice: first with err == -EINPROGRESS, which it\nseems we can just ignore, then with err == 0.\n\nCompared to Sabrina\u0027s original patch this version uses the new\ntls_*crypt_async_wait() helpers and converts the EBUSY to\nEINPROGRESS to avoid having to modify all the error handling\npaths. The handling is identical.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26584",
"url": "https://www.suse.com/security/cve/CVE-2024-26584"
},
{
"category": "external",
"summary": "SUSE Bug 1220186 for CVE-2024-26584",
"url": "https://bugzilla.suse.com/1220186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2024-26584"
},
{
"cve": "CVE-2024-53093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53093"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-multipath: defer partition scanning\n\nWe need to suppress the partition scan from occuring within the\ncontroller\u0027s scan_work context. If a path error occurs here, the IO will\nwait until a path becomes available or all paths are torn down, but that\naction also occurs within scan_work, so it would deadlock. Defer the\npartion scan to a different context that does not block scan_work.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53093",
"url": "https://www.suse.com/security/cve/CVE-2024-53093"
},
{
"category": "external",
"summary": "SUSE Bug 1233640 for CVE-2024-53093",
"url": "https://bugzilla.suse.com/1233640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2024-53093"
},
{
"cve": "CVE-2024-58240",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-58240"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: separate no-async decryption request handling from async\n\nIf we\u0027re not doing async, the handling is much simpler. There\u0027s no\nreference counting, we just need to wait for the completion to wake us\nup and return its result.\n\nWe should preferably also use a separate crypto_wait. I\u0027m not seeing a\nUAF as I did in the past, I think aec7961916f3 (\"tls: fix race between\nasync notify and socket close\") took care of it.\n\nThis will make the next fix easier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-58240",
"url": "https://www.suse.com/security/cve/CVE-2024-58240"
},
{
"category": "external",
"summary": "SUSE Bug 1248847 for CVE-2024-58240",
"url": "https://bugzilla.suse.com/1248847"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "low"
}
],
"title": "CVE-2024-58240"
},
{
"cve": "CVE-2025-21969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21969"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd\n\nAfter the hci sync command releases l2cap_conn, the hci receive data work\nqueue references the released l2cap_conn when sending to the upper layer.\nAdd hci dev lock to the hci receive data work queue to synchronize the two.\n\n[1]\nBUG: KASAN: slab-use-after-free in l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\nRead of size 8 at addr ffff8880271a4000 by task kworker/u9:2/5837\n\nCPU: 0 UID: 0 PID: 5837 Comm: kworker/u9:2 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: hci1 hci_rx_work\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n l2cap_build_cmd net/bluetooth/l2cap_core.c:2964 [inline]\n l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\n l2cap_sig_send_rej net/bluetooth/l2cap_core.c:5502 [inline]\n l2cap_sig_channel net/bluetooth/l2cap_core.c:5538 [inline]\n l2cap_recv_frame+0x221f/0x10db0 net/bluetooth/l2cap_core.c:6817\n hci_acldata_packet net/bluetooth/hci_core.c:3797 [inline]\n hci_rx_work+0x508/0xdb0 net/bluetooth/hci_core.c:4040\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n \u003c/TASK\u003e\n\nAllocated by task 5837:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n l2cap_conn_add+0xa9/0x8e0 net/bluetooth/l2cap_core.c:6860\n l2cap_connect_cfm+0x115/0x1090 net/bluetooth/l2cap_core.c:7239\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_remote_features_evt+0x68e/0xac0 net/bluetooth/hci_event.c:3726\n hci_event_func net/bluetooth/hci_event.c:7473 [inline]\n hci_event_packet+0xac2/0x1540 net/bluetooth/hci_event.c:7525\n hci_rx_work+0x3f3/0xdb0 net/bluetooth/hci_core.c:4035\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nFreed by task 54:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n poison_slab_object mm/kasan/common.c:247 [inline]\n __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n kasan_slab_free include/linux/kasan.h:233 [inline]\n slab_free_hook mm/slub.c:2353 [inline]\n slab_free mm/slub.c:4613 [inline]\n kfree+0x196/0x430 mm/slub.c:4761\n l2cap_connect_cfm+0xcc/0x1090 net/bluetooth/l2cap_core.c:7235\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_conn_failed+0x287/0x400 net/bluetooth/hci_conn.c:1266\n hci_abort_conn_sync+0x56c/0x11f0 net/bluetooth/hci_sync.c:5603\n hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21969",
"url": "https://www.suse.com/security/cve/CVE-2025-21969"
},
{
"category": "external",
"summary": "SUSE Bug 1240784 for CVE-2025-21969",
"url": "https://bugzilla.suse.com/1240784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-21969"
},
{
"cve": "CVE-2025-38011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38011"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: csa unmap use uninterruptible lock\n\nAfter process exit to unmap csa and free GPU vm, if signal is accepted\nand then waiting to take vm lock is interrupted and return, it causes\nmemory leaking and below warning backtrace.\n\nChange to use uninterruptible wait lock fix the issue.\n\nWARNING: CPU: 69 PID: 167800 at amd/amdgpu/amdgpu_kms.c:1525\n amdgpu_driver_postclose_kms+0x294/0x2a0 [amdgpu]\n Call Trace:\n \u003cTASK\u003e\n drm_file_free.part.0+0x1da/0x230 [drm]\n drm_close_helper.isra.0+0x65/0x70 [drm]\n drm_release+0x6a/0x120 [drm]\n amdgpu_drm_release+0x51/0x60 [amdgpu]\n __fput+0x9f/0x280\n ____fput+0xe/0x20\n task_work_run+0x67/0xa0\n do_exit+0x217/0x3c0\n do_group_exit+0x3b/0xb0\n get_signal+0x14a/0x8d0\n arch_do_signal_or_restart+0xde/0x100\n exit_to_user_mode_loop+0xc1/0x1a0\n exit_to_user_mode_prepare+0xf4/0x100\n syscall_exit_to_user_mode+0x17/0x40\n do_syscall_64+0x69/0xc0\n\n(cherry picked from commit 7dbbfb3c171a6f63b01165958629c9c26abf38ab)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38011",
"url": "https://www.suse.com/security/cve/CVE-2025-38011"
},
{
"category": "external",
"summary": "SUSE Bug 1244729 for CVE-2025-38011",
"url": "https://bugzilla.suse.com/1244729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-38011"
},
{
"cve": "CVE-2025-38184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38184"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer\n\nThe reproduction steps:\n1. create a tun interface\n2. enable l2 bearer\n3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun\n\ntipc: Started in network mode\ntipc: Node identity 8af312d38a21, cluster identity 4711\ntipc: Enabled bearer \u003ceth:syz_tun\u003e, priority 1\nOops: general protection fault\nKASAN: null-ptr-deref in range\nCPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT\nHardware name: QEMU Ubuntu 24.04 PC\nRIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0\n\nthe ub was in fact a struct dev.\n\nwhen bid != 0 \u0026\u0026 skip_cnt != 0, bearer_list[bid] may be NULL or\nother media when other thread changes it.\n\nfix this by checking media_id.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38184",
"url": "https://www.suse.com/security/cve/CVE-2025-38184"
},
{
"category": "external",
"summary": "SUSE Bug 1245956 for CVE-2025-38184",
"url": "https://bugzilla.suse.com/1245956"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-38184"
},
{
"cve": "CVE-2025-38216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38216"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Restore context entry setup order for aliased devices\n\nCommit 2031c469f816 (\"iommu/vt-d: Add support for static identity domain\")\nchanged the context entry setup during domain attachment from a\nset-and-check policy to a clear-and-reset approach. This inadvertently\nintroduced a regression affecting PCI aliased devices behind PCIe-to-PCI\nbridges.\n\nSpecifically, keyboard and touchpad stopped working on several Apple\nMacbooks with below messages:\n\n kernel: platform pxa2xx-spi.3: Adding to iommu group 20\n kernel: input: Apple SPI Keyboard as\n /devices/pci0000:00/0000:00:1e.3/pxa2xx-spi.3/spi_master/spi2/spi-APP000D:00/input/input0\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr\n 0xffffa000 [fault reason 0x06] PTE Read access is not set\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr\n 0xffffa000 [fault reason 0x06] PTE Read access is not set\n kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr\n 0xffffa000 [fault reason 0x06] PTE Read access is not set\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00\n\nFix this by restoring the previous context setup order.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38216",
"url": "https://www.suse.com/security/cve/CVE-2025-38216"
},
{
"category": "external",
"summary": "SUSE Bug 1245963 for CVE-2025-38216",
"url": "https://bugzilla.suse.com/1245963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-38216"
},
{
"cve": "CVE-2025-38488",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38488"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free in crypt_message when using async crypto\n\nThe CVE-2024-50047 fix removed asynchronous crypto handling from\ncrypt_message(), assuming all crypto operations are synchronous.\nHowever, when hardware crypto accelerators are used, this can cause\nuse-after-free crashes:\n\n crypt_message()\n // Allocate the creq buffer containing the req\n creq = smb2_get_aead_req(..., \u0026req);\n\n // Async encryption returns -EINPROGRESS immediately\n rc = enc ? crypto_aead_encrypt(req) : crypto_aead_decrypt(req);\n\n // Free creq while async operation is still in progress\n kvfree_sensitive(creq, ...);\n\nHardware crypto modules often implement async AEAD operations for\nperformance. When crypto_aead_encrypt/decrypt() returns -EINPROGRESS,\nthe operation completes asynchronously. Without crypto_wait_req(),\nthe function immediately frees the request buffer, leading to crashes\nwhen the driver later accesses the freed memory.\n\nThis results in a use-after-free condition when the hardware crypto\ndriver later accesses the freed request structure, leading to kernel\ncrashes with NULL pointer dereferences.\n\nThe issue occurs because crypto_alloc_aead() with mask=0 doesn\u0027t\nguarantee synchronous operation. Even without CRYPTO_ALG_ASYNC in\nthe mask, async implementations can be selected.\n\nFix by restoring the async crypto handling:\n- DECLARE_CRYPTO_WAIT(wait) for completion tracking\n- aead_request_set_callback() for async completion notification\n- crypto_wait_req() to wait for operation completion\n\nThis ensures the request buffer isn\u0027t freed until the crypto operation\ncompletes, whether synchronous or asynchronous, while preserving the\nCVE-2024-50047 fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38488",
"url": "https://www.suse.com/security/cve/CVE-2025-38488"
},
{
"category": "external",
"summary": "SUSE Bug 1247239 for CVE-2025-38488",
"url": "https://bugzilla.suse.com/1247239"
},
{
"category": "external",
"summary": "SUSE Bug 1247240 for CVE-2025-38488",
"url": "https://bugzilla.suse.com/1247240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2025-38488"
},
{
"cve": "CVE-2025-38553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38553"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Restrict conditions for adding duplicating netems to qdisc tree\n\nnetem_enqueue\u0027s duplication prevention logic breaks when a netem\nresides in a qdisc tree with other netems - this can lead to a\nsoft lockup and OOM loop in netem_dequeue, as seen in [1].\nEnsure that a duplicating netem cannot exist in a tree with other\nnetems.\n\nPrevious approaches suggested in discussions in chronological order:\n\n1) Track duplication status or ttl in the sk_buff struct. Considered\ntoo specific a use case to extend such a struct, though this would\nbe a resilient fix and address other previous and potential future\nDOS bugs like the one described in loopy fun [2].\n\n2) Restrict netem_enqueue recursion depth like in act_mirred with a\nper cpu variable. However, netem_dequeue can call enqueue on its\nchild, and the depth restriction could be bypassed if the child is a\nnetem.\n\n3) Use the same approach as in 2, but add metadata in netem_skb_cb\nto handle the netem_dequeue case and track a packet\u0027s involvement\nin duplication. This is an overly complex approach, and Jamal\nnotes that the skb cb can be overwritten to circumvent this\nsafeguard.\n\n4) Prevent the addition of a netem to a qdisc tree if its ancestral\npath contains a netem. However, filters and actions can cause a\npacket to change paths when re-enqueued to the root from netem\nduplication, leading us to the current solution: prevent a\nduplicating netem from inhabiting the same tree as other netems.\n\n[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/\n[2] https://lwn.net/Articles/719297/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38553",
"url": "https://www.suse.com/security/cve/CVE-2025-38553"
},
{
"category": "external",
"summary": "SUSE Bug 1248255 for CVE-2025-38553",
"url": "https://bugzilla.suse.com/1248255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-38553"
},
{
"cve": "CVE-2025-38572",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38572"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: reject malicious packets in ipv6_gso_segment()\n\nsyzbot was able to craft a packet with very long IPv6 extension headers\nleading to an overflow of skb-\u003etransport_header.\n\nThis 16bit field has a limited range.\n\nAdd skb_reset_transport_header_careful() helper and use it\nfrom ipv6_gso_segment()\n\nWARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline]\nWARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151\nModules linked in:\nCPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\n RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline]\n RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151\nCall Trace:\n \u003cTASK\u003e\n skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53\n nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110\n skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53\n __skb_gso_segment+0x342/0x510 net/core/gso.c:124\n skb_gso_segment include/net/gso.h:83 [inline]\n validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950\n validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000\n sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329\n __dev_xmit_skb net/core/dev.c:4102 [inline]\n __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38572",
"url": "https://www.suse.com/security/cve/CVE-2025-38572"
},
{
"category": "external",
"summary": "SUSE Bug 1248399 for CVE-2025-38572",
"url": "https://bugzilla.suse.com/1248399"
},
{
"category": "external",
"summary": "SUSE Bug 1248400 for CVE-2025-38572",
"url": "https://bugzilla.suse.com/1248400"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2025-38572"
},
{
"cve": "CVE-2025-38664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38664"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix a null pointer dereference in ice_copy_and_init_pkg()\n\nAdd check for the return value of devm_kmemdup()\nto prevent potential null pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38664",
"url": "https://www.suse.com/security/cve/CVE-2025-38664"
},
{
"category": "external",
"summary": "SUSE Bug 1248628 for CVE-2025-38664",
"url": "https://bugzilla.suse.com/1248628"
},
{
"category": "external",
"summary": "SUSE Bug 1248631 for CVE-2025-38664",
"url": "https://bugzilla.suse.com/1248631"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2025-38664"
},
{
"cve": "CVE-2025-38685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38685"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix vmalloc out-of-bounds write in fast_imageblit\n\nThis issue triggers when a userspace program does an ioctl\nFBIOPUT_CON2FBMAP by passing console number and frame buffer number.\nIdeally this maps console to frame buffer and updates the screen if\nconsole is visible.\n\nAs part of mapping it has to do resize of console according to frame\nbuffer info. if this resize fails and returns from vc_do_resize() and\ncontinues further. At this point console and new frame buffer are mapped\nand sets display vars. Despite failure still it continue to proceed\nupdating the screen at later stages where vc_data is related to previous\nframe buffer and frame buffer info and display vars are mapped to new\nframe buffer and eventully leading to out-of-bounds write in\nfast_imageblit(). This bheviour is excepted only when fg_console is\nequal to requested console which is a visible console and updates screen\nwith invalid struct references in fbcon_putcs().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38685",
"url": "https://www.suse.com/security/cve/CVE-2025-38685"
},
{
"category": "external",
"summary": "SUSE Bug 1249220 for CVE-2025-38685",
"url": "https://bugzilla.suse.com/1249220"
},
{
"category": "external",
"summary": "SUSE Bug 1249240 for CVE-2025-38685",
"url": "https://bugzilla.suse.com/1249240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "important"
}
],
"title": "CVE-2025-38685"
},
{
"cve": "CVE-2025-38713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38713"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()\n\nThe hfsplus_readdir() method is capable to crash by calling\nhfsplus_uni2asc():\n\n[ 667.121659][ T9805] ==================================================================\n[ 667.122651][ T9805] BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0x902/0xa10\n[ 667.123627][ T9805] Read of size 2 at addr ffff88802592f40c by task repro/9805\n[ 667.124578][ T9805]\n[ 667.124876][ T9805] CPU: 3 UID: 0 PID: 9805 Comm: repro Not tainted 6.16.0-rc3 #1 PREEMPT(full)\n[ 667.124886][ T9805] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 667.124890][ T9805] Call Trace:\n[ 667.124893][ T9805] \u003cTASK\u003e\n[ 667.124896][ T9805] dump_stack_lvl+0x10e/0x1f0\n[ 667.124911][ T9805] print_report+0xd0/0x660\n[ 667.124920][ T9805] ? __virt_addr_valid+0x81/0x610\n[ 667.124928][ T9805] ? __phys_addr+0xe8/0x180\n[ 667.124934][ T9805] ? hfsplus_uni2asc+0x902/0xa10\n[ 667.124942][ T9805] kasan_report+0xc6/0x100\n[ 667.124950][ T9805] ? hfsplus_uni2asc+0x902/0xa10\n[ 667.124959][ T9805] hfsplus_uni2asc+0x902/0xa10\n[ 667.124966][ T9805] ? hfsplus_bnode_read+0x14b/0x360\n[ 667.124974][ T9805] hfsplus_readdir+0x845/0xfc0\n[ 667.124984][ T9805] ? __pfx_hfsplus_readdir+0x10/0x10\n[ 667.124994][ T9805] ? stack_trace_save+0x8e/0xc0\n[ 667.125008][ T9805] ? iterate_dir+0x18b/0xb20\n[ 667.125015][ T9805] ? trace_lock_acquire+0x85/0xd0\n[ 667.125022][ T9805] ? lock_acquire+0x30/0x80\n[ 667.125029][ T9805] ? iterate_dir+0x18b/0xb20\n[ 667.125037][ T9805] ? down_read_killable+0x1ed/0x4c0\n[ 667.125044][ T9805] ? putname+0x154/0x1a0\n[ 667.125051][ T9805] ? __pfx_down_read_killable+0x10/0x10\n[ 667.125058][ T9805] ? apparmor_file_permission+0x239/0x3e0\n[ 667.125069][ T9805] iterate_dir+0x296/0xb20\n[ 667.125076][ T9805] __x64_sys_getdents64+0x13c/0x2c0\n[ 667.125084][ T9805] ? __pfx___x64_sys_getdents64+0x10/0x10\n[ 667.125091][ T9805] ? __x64_sys_openat+0x141/0x200\n[ 667.125126][ T9805] ? __pfx_filldir64+0x10/0x10\n[ 667.125134][ T9805] ? do_user_addr_fault+0x7fe/0x12f0\n[ 667.125143][ T9805] do_syscall_64+0xc9/0x480\n[ 667.125151][ T9805] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 667.125158][ T9805] RIP: 0033:0x7fa8753b2fc9\n[ 667.125164][ T9805] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 48\n[ 667.125172][ T9805] RSP: 002b:00007ffe96f8e0f8 EFLAGS: 00000217 ORIG_RAX: 00000000000000d9\n[ 667.125181][ T9805] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa8753b2fc9\n[ 667.125185][ T9805] RDX: 0000000000000400 RSI: 00002000000063c0 RDI: 0000000000000004\n[ 667.125190][ T9805] RBP: 00007ffe96f8e110 R08: 00007ffe96f8e110 R09: 00007ffe96f8e110\n[ 667.125195][ T9805] R10: 0000000000000000 R11: 0000000000000217 R12: 0000556b1e3b4260\n[ 667.125199][ T9805] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 667.125207][ T9805] \u003c/TASK\u003e\n[ 667.125210][ T9805]\n[ 667.145632][ T9805] Allocated by task 9805:\n[ 667.145991][ T9805] kasan_save_stack+0x20/0x40\n[ 667.146352][ T9805] kasan_save_track+0x14/0x30\n[ 667.146717][ T9805] __kasan_kmalloc+0xaa/0xb0\n[ 667.147065][ T9805] __kmalloc_noprof+0x205/0x550\n[ 667.147448][ T9805] hfsplus_find_init+0x95/0x1f0\n[ 667.147813][ T9805] hfsplus_readdir+0x220/0xfc0\n[ 667.148174][ T9805] iterate_dir+0x296/0xb20\n[ 667.148549][ T9805] __x64_sys_getdents64+0x13c/0x2c0\n[ 667.148937][ T9805] do_syscall_64+0xc9/0x480\n[ 667.149291][ T9805] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 667.149809][ T9805]\n[ 667.150030][ T9805] The buggy address belongs to the object at ffff88802592f000\n[ 667.150030][ T9805] which belongs to the cache kmalloc-2k of size 2048\n[ 667.151282][ T9805] The buggy address is located 0 bytes to the right of\n[ 667.151282][ T9805] allocated 1036-byte region [ffff88802592f000, ffff88802592f40c)\n[ 667.1\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38713",
"url": "https://www.suse.com/security/cve/CVE-2025-38713"
},
{
"category": "external",
"summary": "SUSE Bug 1249200 for CVE-2025-38713",
"url": "https://bugzilla.suse.com/1249200"
},
{
"category": "external",
"summary": "SUSE Bug 1249738 for CVE-2025-38713",
"url": "https://bugzilla.suse.com/1249738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-38713"
},
{
"cve": "CVE-2025-39751",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39751"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39751",
"url": "https://www.suse.com/security/cve/CVE-2025-39751"
},
{
"category": "external",
"summary": "SUSE Bug 1249538 for CVE-2025-39751",
"url": "https://bugzilla.suse.com/1249538"
},
{
"category": "external",
"summary": "SUSE Bug 1249539 for CVE-2025-39751",
"url": "https://bugzilla.suse.com/1249539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-39751"
},
{
"cve": "CVE-2025-39823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39823"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: use array_index_nospec with indices that come from guest\n\nmin and dest_id are guest-controlled indices. Using array_index_nospec()\nafter the bounds checks clamps these values to mitigate speculative execution\nside-channels.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39823",
"url": "https://www.suse.com/security/cve/CVE-2025-39823"
},
{
"category": "external",
"summary": "SUSE Bug 1250002 for CVE-2025-39823",
"url": "https://bugzilla.suse.com/1250002"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.221.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.221.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.221.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T06:14:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-39823"
}
]
}
suse-su-2022:4510-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP5)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-122_139 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4510,SUSE-SLE-Live-Patching-12-SP5-2022-4510",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4510-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4510-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224510-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4510-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013254.html"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP5)",
"tracking": {
"current_release_date": "2022-12-16T16:07:49Z",
"generator": {
"date": "2022-12-16T16:07:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4510-1",
"initial_release_date": "2022-12-16T16:07:49Z",
"revision_history": [
{
"date": "2022-12-16T16:07:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_139-default-2-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_139-default-2-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_139-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_139-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_139-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T16:07:49Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_139-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T16:07:49Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2023:2232-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-2483: Fixed a use after free bug in emac_remove due caused by a race condition (bsc#1211037).\n- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2020-36691: Fixed a denial of service (unbounded recursion) vulnerability via a nested Netlink policy with a back reference (bsc#1209613 bsc#1209777).\n- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535).\n- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).\n- CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).\n- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2023-1855: Fixed an use-after-free flaw in xgene_hwmon_remove (bsc#1210202).\n- CVE-2023-1989: Fixed an use-after-free flaw in btsdio_remove (bsc#1210336).\n- CVE-2023-1990: Fixed an use-after-free flaw in ndlc_remove (bsc#1210337).\n- CVE-2023-1998: Fixed an use-after-free flaw during login when accessing the shost ipaddress (bsc#1210506).\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).\n\nThe following non-security bugs were fixed:\n\n- Do not sign the vanilla kernel (bsc#1209008).\n- Fix kABI breakage (bsc#1208333)\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).\n- PCI: hv: Fix a race condition bug in hv_pci_query_relations() (bsc#1207185).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).\n- Remove obsolete KMP obsoletes (bsc#1210469).\n- Replace mkinitrd dependency with dracut (bsc#1202353).\n- cifs: fix double free in dfs mounts (bsc#1209845).\n- cifs: fix negotiate context parsing (bsc#1210301).\n- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1209845).\n- cifs: missing null pointer check in cifs_mount (bsc#1209845).\n- cifs: serialize all mount attempts (bsc#1209845).\n- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).\n- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).\n- k-m-s: Drop Linux 2.6 support\n- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2232,SUSE-OpenStack-Cloud-9-2023-2232,SUSE-OpenStack-Cloud-Crowbar-9-2023-2232,SUSE-SLE-HA-12-SP4-2023-2232,SUSE-SLE-Live-Patching-12-SP4-2023-2232,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2232,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2232",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2232-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2232-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232232-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2232-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html"
},
{
"category": "self",
"summary": "SUSE Bug 1076830",
"url": "https://bugzilla.suse.com/1076830"
},
{
"category": "self",
"summary": "SUSE Bug 1194535",
"url": "https://bugzilla.suse.com/1194535"
},
{
"category": "self",
"summary": "SUSE Bug 1202353",
"url": "https://bugzilla.suse.com/1202353"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1207036",
"url": "https://bugzilla.suse.com/1207036"
},
{
"category": "self",
"summary": "SUSE Bug 1207125",
"url": "https://bugzilla.suse.com/1207125"
},
{
"category": "self",
"summary": "SUSE Bug 1207168",
"url": "https://bugzilla.suse.com/1207168"
},
{
"category": "self",
"summary": "SUSE Bug 1207185",
"url": "https://bugzilla.suse.com/1207185"
},
{
"category": "self",
"summary": "SUSE Bug 1207795",
"url": "https://bugzilla.suse.com/1207795"
},
{
"category": "self",
"summary": "SUSE Bug 1207845",
"url": "https://bugzilla.suse.com/1207845"
},
{
"category": "self",
"summary": "SUSE Bug 1208179",
"url": "https://bugzilla.suse.com/1208179"
},
{
"category": "self",
"summary": "SUSE Bug 1208333",
"url": "https://bugzilla.suse.com/1208333"
},
{
"category": "self",
"summary": "SUSE Bug 1208599",
"url": "https://bugzilla.suse.com/1208599"
},
{
"category": "self",
"summary": "SUSE Bug 1208777",
"url": "https://bugzilla.suse.com/1208777"
},
{
"category": "self",
"summary": "SUSE Bug 1208837",
"url": "https://bugzilla.suse.com/1208837"
},
{
"category": "self",
"summary": "SUSE Bug 1208850",
"url": "https://bugzilla.suse.com/1208850"
},
{
"category": "self",
"summary": "SUSE Bug 1209008",
"url": "https://bugzilla.suse.com/1209008"
},
{
"category": "self",
"summary": "SUSE Bug 1209052",
"url": "https://bugzilla.suse.com/1209052"
},
{
"category": "self",
"summary": "SUSE Bug 1209256",
"url": "https://bugzilla.suse.com/1209256"
},
{
"category": "self",
"summary": "SUSE Bug 1209289",
"url": "https://bugzilla.suse.com/1209289"
},
{
"category": "self",
"summary": "SUSE Bug 1209291",
"url": "https://bugzilla.suse.com/1209291"
},
{
"category": "self",
"summary": "SUSE Bug 1209532",
"url": "https://bugzilla.suse.com/1209532"
},
{
"category": "self",
"summary": "SUSE Bug 1209547",
"url": "https://bugzilla.suse.com/1209547"
},
{
"category": "self",
"summary": "SUSE Bug 1209549",
"url": "https://bugzilla.suse.com/1209549"
},
{
"category": "self",
"summary": "SUSE Bug 1209613",
"url": "https://bugzilla.suse.com/1209613"
},
{
"category": "self",
"summary": "SUSE Bug 1209687",
"url": "https://bugzilla.suse.com/1209687"
},
{
"category": "self",
"summary": "SUSE Bug 1209777",
"url": "https://bugzilla.suse.com/1209777"
},
{
"category": "self",
"summary": "SUSE Bug 1209778",
"url": "https://bugzilla.suse.com/1209778"
},
{
"category": "self",
"summary": "SUSE Bug 1209845",
"url": "https://bugzilla.suse.com/1209845"
},
{
"category": "self",
"summary": "SUSE Bug 1209871",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "self",
"summary": "SUSE Bug 1209887",
"url": "https://bugzilla.suse.com/1209887"
},
{
"category": "self",
"summary": "SUSE Bug 1210124",
"url": "https://bugzilla.suse.com/1210124"
},
{
"category": "self",
"summary": "SUSE Bug 1210202",
"url": "https://bugzilla.suse.com/1210202"
},
{
"category": "self",
"summary": "SUSE Bug 1210301",
"url": "https://bugzilla.suse.com/1210301"
},
{
"category": "self",
"summary": "SUSE Bug 1210329",
"url": "https://bugzilla.suse.com/1210329"
},
{
"category": "self",
"summary": "SUSE Bug 1210336",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "self",
"summary": "SUSE Bug 1210337",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "self",
"summary": "SUSE Bug 1210469",
"url": "https://bugzilla.suse.com/1210469"
},
{
"category": "self",
"summary": "SUSE Bug 1210498",
"url": "https://bugzilla.suse.com/1210498"
},
{
"category": "self",
"summary": "SUSE Bug 1210506",
"url": "https://bugzilla.suse.com/1210506"
},
{
"category": "self",
"summary": "SUSE Bug 1210647",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "self",
"summary": "SUSE Bug 1211037",
"url": "https://bugzilla.suse.com/1211037"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36691 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3923 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4203 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0394 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0590 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0597 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1076 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1095 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1118 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1390 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1513 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1513/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1611 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1670 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1855 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1989 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1990 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1998 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2162 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-23454 page",
"url": "https://www.suse.com/security/cve/CVE-2023-23454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-23455 page",
"url": "https://www.suse.com/security/cve/CVE-2023-23455/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2483 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28328 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28772 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-30772 page",
"url": "https://www.suse.com/security/cve/CVE-2023-30772/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-07-06T01:17:55Z",
"generator": {
"date": "2023-07-06T01:17:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2232-1",
"initial_release_date": "2023-07-06T01:17:55Z",
"revision_history": [
{
"date": "2023-07-06T01:17:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.125.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.125.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.125.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.125.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "drbd-9.0.14+git.62f906cf-4.26.2.aarch64",
"product": {
"name": "drbd-9.0.14+git.62f906cf-4.26.2.aarch64",
"product_id": "drbd-9.0.14+git.62f906cf-4.26.2.aarch64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.aarch64",
"product": {
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.aarch64",
"product_id": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.125.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.125.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.125.1.aarch64",
"product_id": "kernel-default-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.125.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.125.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.125.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.125.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.125.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.125.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.125.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.125.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.125.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.125.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.125.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.125.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.125.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.125.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.125.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.125.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.125.1.noarch",
"product_id": "kernel-devel-4.12.14-95.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.125.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.125.1.noarch",
"product_id": "kernel-docs-4.12.14-95.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.125.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.125.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.125.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.125.1.noarch",
"product_id": "kernel-macros-4.12.14-95.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.125.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.125.1.noarch",
"product_id": "kernel-source-4.12.14-95.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.125.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.125.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.125.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"product": {
"name": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"product_id": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"product": {
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"product_id": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.125.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.125.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.125.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.125.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"product": {
"name": "drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"product_id": "drbd-9.0.14+git.62f906cf-4.26.2.s390x"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"product": {
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"product_id": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.125.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.125.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.125.1.s390x",
"product_id": "kernel-default-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.125.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.125.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.125.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.125.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.125.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.125.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.125.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.125.1.s390x",
"product_id": "kernel-syms-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.125.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.125.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.125.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.125.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.125.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.125.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.125.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.125.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.125.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.125.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.125.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.125.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"product": {
"name": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"product_id": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"product": {
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"product_id": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "drbd-kmp-rt-9.0.14+git.62f906cf_k4.12.14_3.3-4.26.2.x86_64",
"product": {
"name": "drbd-kmp-rt-9.0.14+git.62f906cf_k4.12.14_3.3-4.26.2.x86_64",
"product_id": "drbd-kmp-rt-9.0.14+git.62f906cf_k4.12.14_3.3-4.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.125.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.125.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.125.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.125.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.125.1.x86_64",
"product_id": "kernel-default-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.125.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.125.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.125.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.125.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.125.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.125.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.125.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.125.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.125.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.125.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.125.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.125.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.125.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.125.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.125.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-espos:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le"
},
"product_reference": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.14+git.62f906cf-4.26.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x"
},
"product_reference": "drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64"
},
"product_reference": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le"
},
"product_reference": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x"
},
"product_reference": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64"
},
"product_reference": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.125.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.125.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.125.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.125.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.125.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.125.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.125.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.125.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2020-36691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36691"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36691",
"url": "https://www.suse.com/security/cve/CVE-2020-36691"
},
{
"category": "external",
"summary": "SUSE Bug 1209613 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209613"
},
{
"category": "external",
"summary": "SUSE Bug 1209777 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2021-3923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3923"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3923",
"url": "https://www.suse.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "SUSE Bug 1209778 for CVE-2021-3923",
"url": "https://bugzilla.suse.com/1209778"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "low"
}
],
"title": "CVE-2021-3923"
},
{
"cve": "CVE-2021-4203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4203"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4203",
"url": "https://www.suse.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "SUSE Bug 1194535 for CVE-2021-4203",
"url": "https://bugzilla.suse.com/1194535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2022-20567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20567"
}
],
"notes": [
{
"category": "general",
"text": "In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20567",
"url": "https://www.suse.com/security/cve/CVE-2022-20567"
},
{
"category": "external",
"summary": "SUSE Bug 1208850 for CVE-2022-20567",
"url": "https://bugzilla.suse.com/1208850"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-20567"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2023-0394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0394"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0394",
"url": "https://www.suse.com/security/cve/CVE-2023-0394"
},
{
"category": "external",
"summary": "SUSE Bug 1207168 for CVE-2023-0394",
"url": "https://bugzilla.suse.com/1207168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-0590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0590"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0590",
"url": "https://www.suse.com/security/cve/CVE-2023-0590"
},
{
"category": "external",
"summary": "SUSE Bug 1207795 for CVE-2023-0590",
"url": "https://bugzilla.suse.com/1207795"
},
{
"category": "external",
"summary": "SUSE Bug 1207822 for CVE-2023-0590",
"url": "https://bugzilla.suse.com/1207822"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2023-0590",
"url": "https://bugzilla.suse.com/1211495"
},
{
"category": "external",
"summary": "SUSE Bug 1211833 for CVE-2023-0590",
"url": "https://bugzilla.suse.com/1211833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "important"
}
],
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0597"
}
],
"notes": [
{
"category": "general",
"text": "A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0597",
"url": "https://www.suse.com/security/cve/CVE-2023-0597"
},
{
"category": "external",
"summary": "SUSE Bug 1207845 for CVE-2023-0597",
"url": "https://bugzilla.suse.com/1207845"
},
{
"category": "external",
"summary": "SUSE Bug 1212395 for CVE-2023-0597",
"url": "https://bugzilla.suse.com/1212395"
},
{
"category": "external",
"summary": "SUSE Bug 1213271 for CVE-2023-0597",
"url": "https://bugzilla.suse.com/1213271"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-0597"
},
{
"cve": "CVE-2023-1076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1076"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1076",
"url": "https://www.suse.com/security/cve/CVE-2023-1076"
},
{
"category": "external",
"summary": "SUSE Bug 1208599 for CVE-2023-1076",
"url": "https://bugzilla.suse.com/1208599"
},
{
"category": "external",
"summary": "SUSE Bug 1214019 for CVE-2023-1076",
"url": "https://bugzilla.suse.com/1214019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1095"
}
],
"notes": [
{
"category": "general",
"text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1095",
"url": "https://www.suse.com/security/cve/CVE-2023-1095"
},
{
"category": "external",
"summary": "SUSE Bug 1208777 for CVE-2023-1095",
"url": "https://bugzilla.suse.com/1208777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1118"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1118",
"url": "https://www.suse.com/security/cve/CVE-2023-1118"
},
{
"category": "external",
"summary": "SUSE Bug 1208837 for CVE-2023-1118",
"url": "https://bugzilla.suse.com/1208837"
},
{
"category": "external",
"summary": "SUSE Bug 1208910 for CVE-2023-1118",
"url": "https://bugzilla.suse.com/1208910"
},
{
"category": "external",
"summary": "SUSE Bug 1210423 for CVE-2023-1118",
"url": "https://bugzilla.suse.com/1210423"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2023-1118",
"url": "https://bugzilla.suse.com/1211495"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-1118",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-1118",
"url": "https://bugzilla.suse.com/1213842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-1118"
},
{
"cve": "CVE-2023-1390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1390"
}
],
"notes": [
{
"category": "general",
"text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1390",
"url": "https://www.suse.com/security/cve/CVE-2023-1390"
},
{
"category": "external",
"summary": "SUSE Bug 1209289 for CVE-2023-1390",
"url": "https://bugzilla.suse.com/1209289"
},
{
"category": "external",
"summary": "SUSE Bug 1210779 for CVE-2023-1390",
"url": "https://bugzilla.suse.com/1210779"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2023-1390",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "important"
}
],
"title": "CVE-2023-1390"
},
{
"cve": "CVE-2023-1513",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1513"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1513",
"url": "https://www.suse.com/security/cve/CVE-2023-1513"
},
{
"category": "external",
"summary": "SUSE Bug 1209532 for CVE-2023-1513",
"url": "https://bugzilla.suse.com/1209532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "low"
}
],
"title": "CVE-2023-1513"
},
{
"cve": "CVE-2023-1611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1611"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1611",
"url": "https://www.suse.com/security/cve/CVE-2023-1611"
},
{
"category": "external",
"summary": "SUSE Bug 1209687 for CVE-2023-1611",
"url": "https://bugzilla.suse.com/1209687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1670"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1670",
"url": "https://www.suse.com/security/cve/CVE-2023-1670"
},
{
"category": "external",
"summary": "SUSE Bug 1209871 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1855"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1855",
"url": "https://www.suse.com/security/cve/CVE-2023-1855"
},
{
"category": "external",
"summary": "SUSE Bug 1210202 for CVE-2023-1855",
"url": "https://bugzilla.suse.com/1210202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1989"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1989",
"url": "https://www.suse.com/security/cve/CVE-2023-1989"
},
{
"category": "external",
"summary": "SUSE Bug 1210336 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "external",
"summary": "SUSE Bug 1210500 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210500"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "important"
}
],
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1990"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1990",
"url": "https://www.suse.com/security/cve/CVE-2023-1990"
},
{
"category": "external",
"summary": "SUSE Bug 1210337 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "external",
"summary": "SUSE Bug 1210501 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210501"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1998"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1998",
"url": "https://www.suse.com/security/cve/CVE-2023-1998"
},
{
"category": "external",
"summary": "SUSE Bug 1210506 for CVE-2023-1998",
"url": "https://bugzilla.suse.com/1210506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2124"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2124",
"url": "https://www.suse.com/security/cve/CVE-2023-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1210498 for CVE-2023-2124",
"url": "https://bugzilla.suse.com/1210498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2162"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2162",
"url": "https://www.suse.com/security/cve/CVE-2023-2162"
},
{
"category": "external",
"summary": "SUSE Bug 1210647 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "external",
"summary": "SUSE Bug 1210662 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210662"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-23454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-23454"
}
],
"notes": [
{
"category": "general",
"text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-23454",
"url": "https://www.suse.com/security/cve/CVE-2023-23454"
},
{
"category": "external",
"summary": "SUSE Bug 1207036 for CVE-2023-23454",
"url": "https://bugzilla.suse.com/1207036"
},
{
"category": "external",
"summary": "SUSE Bug 1207188 for CVE-2023-23454",
"url": "https://bugzilla.suse.com/1207188"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2023-23454",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2023-23454",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2023-23454",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1211833 for CVE-2023-23454",
"url": "https://bugzilla.suse.com/1211833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "important"
}
],
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-23455"
}
],
"notes": [
{
"category": "general",
"text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-23455",
"url": "https://www.suse.com/security/cve/CVE-2023-23455"
},
{
"category": "external",
"summary": "SUSE Bug 1207125 for CVE-2023-23455",
"url": "https://bugzilla.suse.com/1207125"
},
{
"category": "external",
"summary": "SUSE Bug 1207189 for CVE-2023-23455",
"url": "https://bugzilla.suse.com/1207189"
},
{
"category": "external",
"summary": "SUSE Bug 1211833 for CVE-2023-23455",
"url": "https://bugzilla.suse.com/1211833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "important"
}
],
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-2483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2483"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2483",
"url": "https://www.suse.com/security/cve/CVE-2023-2483"
},
{
"category": "external",
"summary": "SUSE Bug 1211037 for CVE-2023-2483",
"url": "https://bugzilla.suse.com/1211037"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-28328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28328"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28328",
"url": "https://www.suse.com/security/cve/CVE-2023-28328"
},
{
"category": "external",
"summary": "SUSE Bug 1209291 for CVE-2023-28328",
"url": "https://bugzilla.suse.com/1209291"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-28328",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-28464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28464"
}
],
"notes": [
{
"category": "general",
"text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28464",
"url": "https://www.suse.com/security/cve/CVE-2023-28464"
},
{
"category": "external",
"summary": "SUSE Bug 1209052 for CVE-2023-28464",
"url": "https://bugzilla.suse.com/1209052"
},
{
"category": "external",
"summary": "SUSE Bug 1211111 for CVE-2023-28464",
"url": "https://bugzilla.suse.com/1211111"
},
{
"category": "external",
"summary": "SUSE Bug 1220130 for CVE-2023-28464",
"url": "https://bugzilla.suse.com/1220130"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "important"
}
],
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28772"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28772",
"url": "https://www.suse.com/security/cve/CVE-2023-28772"
},
{
"category": "external",
"summary": "SUSE Bug 1209549 for CVE-2023-28772",
"url": "https://bugzilla.suse.com/1209549"
},
{
"category": "external",
"summary": "SUSE Bug 1211110 for CVE-2023-28772",
"url": "https://bugzilla.suse.com/1211110"
},
{
"category": "external",
"summary": "SUSE Bug 1214378 for CVE-2023-28772",
"url": "https://bugzilla.suse.com/1214378"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "important"
}
],
"title": "CVE-2023-28772"
},
{
"cve": "CVE-2023-30772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-30772"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-30772",
"url": "https://www.suse.com/security/cve/CVE-2023-30772"
},
{
"category": "external",
"summary": "SUSE Bug 1210329 for CVE-2023-30772",
"url": "https://bugzilla.suse.com/1210329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-07-06T01:17:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-30772"
}
]
}
suse-su-2022:4504-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bnc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bnc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bnc#1206113).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c of the component IPsec (bsc#1204631). - CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() of the component IPv6 Handler (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-45869: Fixed a race condition in the x86 KVM subsystem which could cause a denial of service (bsc#1205882).\n- CVE-2022-45888: Fixed a use-after-free during physical removal of a USB devices when using drivers/char/xillybus/xillyusb.c (bsc#1205764).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-3566: Fixed a race condition in the functions tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition (bsc#1204405).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n- CVE-2022-41850: Fixed a use-after-free in roccat_report_event in drivers/hid/hid-roccat.c (bnc#1203960).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() (git-fixes).\n- ACPI: HMAT: Fix initiator registration for single-initiator systems (git-fixes).\n- ACPI: HMAT: remove unnecessary variable initialization (git-fixes).\n- ACPI: scan: Add LATT2021 to acpi_ignore_dep_ids[] (git-fixes).\n- ACPI: x86: Add another system to quirk list for forcing StorageD3Enable (git-fixes).\n- ALSA: dice: fix regression for Lexicon I-ONIX FW810S (git-fixes).\n- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).\n- ALSA: hda/hdmi - enable runtime pm for more AMD display audio (git-fixes).\n- ALSA: hda/realtek: Add Positivo C6300 model quirk (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (git-fixes).\n- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (bsc#1205100).\n- ALSA: hda/realtek: fix speakers for Samsung Galaxy Book Pro (bsc#1205100).\n- ALSA: hda: fix potential memleak in \u0027add_widget_node\u0027 (git-fixes).\n- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).\n- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).\n- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).\n- ALSA: usb-audio: Remove redundant workaround for Roland quirk (bsc#1205111).\n- ALSA: usb-audio: Yet more regression for for the delayed card registration (bsc#1205111).\n- ALSA: usb-audio: add quirk to fix Hamedal C20 disconnect issue (git-fixes).\n- ARM: at91: rm9200: fix usb device clock id (git-fixes).\n- ARM: dts: am335x-pcm-953: Define fixed regulators in root node (git-fixes).\n- ARM: dts: at91: sam9g20ek: enable udc vbus gpio pinctrl (git-fixes).\n- ARM: dts: imx6q-prti6q: Fix ref/tcxo-clock-frequency properties (git-fixes).\n- ARM: dts: imx7: Fix NAND controller size-cells (git-fixes).\n- ARM: mxs: fix memory leak in mxs_machine_init() (git-fixes).\n- ASoC: Intel: bytcht_es8316: Add quirk for the Nanote UMPC-01 (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk variant for LAPBC710 NUC15 (git-fixes).\n- ASoC: codecs: jz4725b: Fix spelling mistake \u0027Sourc\u0027 -\u003e \u0027Source\u0027, \u0027Routee\u0027 -\u003e \u0027Route\u0027 (git-fixes).\n- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).\n- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).\n- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).\n- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).\n- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).\n- ASoC: fsl_asrc fsl_esai fsl_sai: allow CONFIG_PM=N (git-fixes).\n- ASoC: fsl_sai: use local device pointer (git-fixes).\n- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).\n- ASoC: mt6660: Keep the pm_runtime enables before component stuff in mt6660_i2c_probe (git-fixes).\n- ASoC: ops: Fix bounds check for _sx controls (git-fixes).\n- ASoC: rt1019: Fix the TDM settings (git-fixes).\n- ASoC: sgtl5000: Reset the CHIP_CLK_CTRL reg on remove (git-fixes).\n- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).\n- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).\n- ASoC: stm32: dfsdm: manage cb buffers cleanup (git-fixes).\n- ASoC: tas2764: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).\n- Bluetooth: 6LoWPAN: add missing hci_dev_put() in get_l2cap_conn() (git-fixes).\n- Bluetooth: Fix not cleanup led when bt_init fails (git-fixes).\n- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (git-fixes).\n- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).\n- Decrease the number of SMB3 smbdirect client SGEs (bsc#1193629).\n- Do not enable CONFIG_ATARI_PARTITION (jsc#PED-1573)\n- Drivers: hv: Always reserve framebuffer region for Gen1 VMs (git-fixes).\n- Drivers: hv: Fix syntax errors in comments (git-fixes).\n- Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region (git-fixes).\n- Drivers: hv: fix repeated words in comments (git-fixes).\n- Drivers: hv: remove duplicate word in a comment (git-fixes).\n- Drivers: hv: vmbus: Accept hv_sock offers in isolated guests (git-fixes).\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Do not wait for the ACPI device upon initialization (git-fixes).\n- Drivers: hv: vmbus: Fix kernel-doc (git-fixes).\n- Drivers: hv: vmbus: Optimize vmbus_on_event (git-fixes).\n- Drivers: hv: vmbus: Release cpu lock in error case (git-fixes).\n- Drivers: hv: vmbus: Use PCI_VENDOR_ID_MICROSOFT for better discoverability (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: fix typo in comment (git-fixes).\n- Fix formatting of client smbdirect RDMA logging (bsc#1193629).\n- HID: core: fix shift-out-of-bounds in hid_report_raw_event (git-fixes).\n- HID: hid-lg4ff: Add check for empty lbuf (git-fixes).\n- HID: hyperv: fix possible memory leak in mousevsc_probe() (git-fixes).\n- HID: playstation: add initial DualSense Edge controller support (git-fixes).\n- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).\n- Handle variable number of SGEs in client smbdirect send (bsc#1193629).\n- IB/hfi1: Correctly move list in sc_disable() (git-fixes)\n- IB: Set IOVA/LENGTH on IB_MR in core/uverbs layers (git-fixes)\n- Input: goodix - try resetting the controller when no config is set (git-fixes).\n- Input: i8042 - fix leaking of platform device on module removal (git-fixes).\n- Input: iforce - invert valid length check when fetching device IDs (git-fixes).\n- Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() (git-fixes).\n- Input: soc_button_array - add Acer Switch V 10 to dmi_use_low_level_irq[] (git-fixes).\n- Input: soc_button_array - add use_low_level_irq module parameter (git-fixes).\n- Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode (git-fixes).\n- KVM: Move wiping of the kvm-\u003evcpus array to common code (git-fixes).\n- KVM: SEV: Mark nested locking of vcpu-\u003elock (git-fixes).\n- KVM: SVM: Disable SEV-ES support if MMIO caching is disable (git-fixes).\n- KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is supported (git-fixes).\n- KVM: SVM: adjust register allocation for __svm_vcpu_run() (git-fixes).\n- KVM: SVM: move guest vmsave/vmload back to assembly (git-fixes).\n- KVM: SVM: replace regs argument of __svm_vcpu_run() with vcpu_svm (git-fixes).\n- KVM: SVM: retrieve VMCB from assembly (git-fixes).\n- KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL (git-fixes).\n- KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS (git-fixes).\n- KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there\u0027s no vPMU (git-fixes).\n- KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled (bsc#1205007).\n- KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable (git-fixes).\n- KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1 (git-fixes).\n- KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists (git-fixes).\n- KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}() (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes jsc#PED-611).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes jsc#PED-611).\n- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).\n- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).\n- KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap (git-fixes).\n- KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non-atomic path (git-fixes).\n- KVM: x86/mmu: fix memoryleak in kvm_mmu_vendor_module_init() (git-fixes).\n- KVM: x86/pmu: Fix and isolate TSX-specific performance event logic (git-fixes).\n- KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog (git-fixes).\n- KVM: x86/pmu: Use different raw event masks for AMD and Intel (git-fixes).\n- KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id (git-fixes).\n- KVM: x86: Fully initialize \u0027struct kvm_lapic_irq\u0027 in kvm_pv_kick_cpu_op() (git-fixes).\n- KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000001H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000006H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000008H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.8000001AH (git-fixes).\n- KVM: x86: Report error when setting CPUID if Hyper-V allocation fails (git-fixes).\n- KVM: x86: Retry page fault if MMU reload is pending and root has no sp (bsc#1205744).\n- KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS) (git-fixes).\n- KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1) (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits (git-fixes).\n- KVM: x86: avoid loading a vCPU after .vm_destroy was called (git-fixes).\n- KVM: x86: emulator: em_sysexit should update ctxt-\u003emode (git-fixes).\n- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).\n- KVM: x86: emulator: update the emulation mode after CR0 write (git-fixes).\n- KVM: x86: emulator: update the emulation mode after rsm (git-fixes).\n- KVM: x86: use a separate asm-offsets.c file (git-fixes).\n- Kconfig: Add option for asm goto w/ tied outputs to workaround clang-13 bug (git-fixes).\n- MIPS: Loongson: Use hwmon_device_register_with_groups() to register hwmon (git-fixes).\n- NFC: nci: Bounds check struct nfc_target arrays (git-fixes).\n- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).\n- PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h (git-fixes).\n- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (git-fixes).\n- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)\n- RDMA/cm: Use SLID in the work completion as the DLID in responder side (git-fixes)\n- RDMA/cma: Use output interface for net_dev check (git-fixes)\n- RDMA/core: Fix null-ptr-deref in ib_core_cleanup() (git-fixes)\n- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)\n- RDMA/hfi1: Prevent use of lock before it is initialized (git-fixes)\n- RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (git-fixes)\n- RDMA/hns: Correct the type of variables participating in the shift operation (git-fixes)\n- RDMA/hns: Disable local invalidate operation (git-fixes)\n- RDMA/hns: Fix incorrect clearing of interrupt status register (git-fixes)\n- RDMA/hns: Fix supported page size (git-fixes)\n- RDMA/hns: Fix wrong fixed value of qp-\u003erq.wqe_shift (git-fixes)\n- RDMA/hns: Remove magic number (git-fixes)\n- RDMA/hns: Remove the num_cqc_timer variable (git-fixes)\n- RDMA/hns: Remove the num_qpc_timer variable (git-fixes)\n- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)\n- RDMA/hns: Replace tab with space in the right-side comments (git-fixes)\n- RDMA/hns: Use hr_reg_xxx() instead of remaining roce_set_xxx() (git-fixes)\n- RDMA/irdma: Fix deadlock in irdma_cleanup_cm_core() (git-fixes)\n- RDMA/irdma: Use s/g array in post send only when its valid (git-fixes)\n- RDMA/mlx5: Set local port to one when accessing counters (git-fixes)\n- RDMA/qedr: clean up work queue on failure in qedr_alloc_resources() (git-fixes)\n- RDMA/rtrs-clt: Use the right sg_cnt after ib_dma_map_sg (git-fixes)\n- RDMA/rtrs-srv: Fix modinfo output for stringify (git-fixes)\n- RDMA/rxe: Limit the number of calls to each tasklet (git-fixes)\n- RDMA/rxe: Remove useless pkt parameters (git-fixes)\n- Reduce client smbdirect max receive segment size (bsc#1193629).\n- Revert \u0027net: phy: meson-gxl: improve link-up behavior\u0027 (git-fixes).\n- Revert \u0027tty: n_gsm: avoid call of sleeping functions from atomic context\u0027 (git-fixes).\n- Revert \u0027tty: n_gsm: replace kicktimer with delayed_work\u0027 (git-fixes).\n- Revert \u0027usb: dwc3: disable USB core PHY management\u0027 (git-fixes).\n- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).\n- SMB3: fix lease break timeout when multiple deferred close handles for the same file (bsc#1193629).\n- USB: bcma: Make GPIO explicitly optional (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID (git-fixes).\n- arcnet: fix potential memory leak in com20020_probe() (git-fixes).\n- arm64/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).\n- arm64: Add AMPERE1 to the Spectre-BHB affected list (git-fixes).\n- arm64: Fix bit-shifting UB in the MIDR_CPU_MODEL() macro (git-fixes)\n- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mn: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: qcom: sa8155p-adp: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8150-xperia-kumano: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250-xperia-edo: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8350-hdk: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: rockchip: add enable-strobe-pulldown to emmc phy on nanopi4 (git-fixes).\n- arm64: dts: rockchip: lower rk3399-puma-haikou SD controller clock frequency (git-fixes).\n- arm64: efi: Fix handling of misaligned runtime regions and drop warning (git-fixes).\n- arm64: errata: Add Cortex-A55 to the repeat tlbi list (git-fixes). Enable CONFIG_ARM64_ERRATUM_2441007, too\n- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes) Enable CONFIG_ARM64_ERRATUM_1742098 in arm64/default\n- arm64: fix rodata=full again (git-fixes)\n- ata: libata-core: do not issue non-internal commands once EH is pending (git-fixes).\n- ata: libata-scsi: fix SYNCHRONIZE CACHE (16) command failure (git-fixes).\n- ata: libata-scsi: simplify __ata_scsi_queuecmd() (git-fixes).\n- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).\n- audit: fix undefined behavior in bit shift for AUDIT_BIT (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (git-fixes).\n- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).\n- blk-mq: do not create hctx debugfs dir until q-\u003edebugfs_dir is created (git-fixes).\n- blk-mq: fix io hung due to missing commit_rqs (git-fixes).\n- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block/rnbd-srv: Set keep_id to true after mutex_trylock (git-fixes).\n- block: add bio_start_io_acct_time() to control start_time (git-fixes).\n- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).\n- block: drop unused includes in \u0026lt;linux/genhd.h\u003e (git-fixes).\n- bridge: switchdev: Fix memory leaks when changing VLAN protocol (git-fixes).\n- btrfs: check if root is readonly while setting security xattr (bsc#1206147).\n- btrfs: do not allow compression on nodatacow files (bsc#1206149).\n- btrfs: export a helper for compression hard check (bsc#1206149).\n- btrfs: fix processing of delayed data refs during backref walking (bsc#1206056).\n- btrfs: fix processing of delayed tree block refs during backref walking (bsc#1206057).\n- btrfs: prevent subvol with swapfile from being deleted (bsc#1206035).\n- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1206036).\n- btrfs: send: fix failures when processing inodes with no links (bsc#1206036).\n- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1206036).\n- btrfs: send: fix sending link commands for existing file paths (bsc#1206036).\n- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1206036).\n- btrfs: send: refactor arguments of get_inode_info() (bsc#1206036).\n- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1206036).\n- btrfs: send: remove unused type parameter to iterate_inode_ref_t (bsc#1206036).\n- btrfs: send: use boolean types for current inode status (bsc#1206036).\n- bus: sunxi-rsb: Remove the shutdown callback (git-fixes).\n- bus: sunxi-rsb: Support atomic transfers (git-fixes).\n- ca8210: Fix crash by zero initializing data (git-fixes).\n- can: af_can: fix NULL pointer dereference in can_rx_register() (git-fixes).\n- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).\n- can: etas_es58x: es58x_init_netdev(): free netdev when register_candev() (git-fixes).\n- can: j1939: j1939_send_one(): fix missing CAN header initialization (git-fixes).\n- can: m_can: Add check for devm_clk_get (git-fixes).\n- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (git-fixes).\n- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).\n- capabilities: fix potential memleak on error path from vfs_getxattr_alloc() (git-fixes).\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).\n- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1206050).\n- ceph: avoid putting the realm twice when decoding snaps fails (bsc#1206051).\n- ceph: do not update snapshot context when there is no new snapshot (bsc#1206047).\n- ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1206048).\n- ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1206049).\n- ceph: properly handle statfs on multifs setups (bsc#1206045).\n- ceph: switch netfs read ops to use rreq-\u003einode instead of rreq-\u003emapping-\u003ehost (bsc#1206046).\n- char: tpm: Protect tpm_pm_suspend with locks (git-fixes).\n- cifs: Add constructor/destructors for tcon-\u003ecfid (bsc#1193629).\n- cifs: Add helper function to check smb1+ server (bsc#1193629).\n- cifs: Do not access tcon-\u003ecfids-\u003ecfid directly from is_path_accessible (bsc#1193629).\n- cifs: Do not use tcon-\u003ecfid directly, use the cfid we get from open_cached_dir (bsc#1193629).\n- cifs: Fix connections leak when tlink setup failed (git-fixes).\n- cifs: Fix memory leak on the deferred close (bsc#1193629).\n- cifs: Fix memory leak when build ntlmssp negotiate blob failed (bsc#1193629).\n- cifs: Fix pages array leak when writedata alloc failed in cifs_writedata_alloc() (bsc#1193629).\n- cifs: Fix pages leak when writedata alloc failed in cifs_write_from_iter() (bsc#1193629).\n- cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message (bsc#1193629).\n- cifs: Fix wrong return value checking when GETFLAGS (git-fixes).\n- cifs: Fix xid leak in cifs_copy_file_range() (bsc#1193629).\n- cifs: Fix xid leak in cifs_create() (bsc#1193629).\n- cifs: Fix xid leak in cifs_flock() (bsc#1193629).\n- cifs: Fix xid leak in cifs_get_file_info_unix() (bsc#1193629).\n- cifs: Fix xid leak in cifs_ses_add_channel() (bsc#1193629).\n- cifs: Make tcon contain a wrapper structure cached_fids instead of cached_fid (bsc#1193629).\n- cifs: Move cached-dir functions into a separate file (bsc#1193629).\n- cifs: Replace a couple of one-element arrays with flexible-array members (bsc#1193629).\n- cifs: Use after free in debug code (git-fixes).\n- cifs: Use help macro to get the header preamble size (bsc#1193629).\n- cifs: Use help macro to get the mid header size (bsc#1193629).\n- cifs: add check for returning value of SMB2_close_init (git-fixes).\n- cifs: add check for returning value of SMB2_set_info_init (git-fixes).\n- cifs: add missing spinlock around tcon refcount (bsc#1193629).\n- cifs: alloc_mid function should be marked as static (bsc#1193629).\n- cifs: always initialize struct msghdr smb_msg completely (bsc#1193629).\n- cifs: always iterate smb sessions using primary channel (bsc#1193629).\n- cifs: avoid deadlocks while updating iface (bsc#1193629).\n- cifs: avoid unnecessary iteration of tcp sessions (bsc#1193629).\n- cifs: avoid use of global locks for high contention data (bsc#1193629).\n- cifs: cache the dirents for entries in a cached directory (bsc#1193629).\n- cifs: change iface_list from array to sorted linked list (bsc#1193629).\n- cifs: destage dirty pages before re-reading them for cache=none (bsc#1193629).\n- cifs: do not send down the destination address to sendmsg for a SOCK_STREAM (bsc#1193629).\n- cifs: drop the lease for cached directories on rmdir or rename (bsc#1193629).\n- cifs: during reconnect, update interface if necessary (bsc#1193629).\n- cifs: enable caching of directories for which a lease is held (bsc#1193629).\n- cifs: find and use the dentry for cached non-root directories also (bsc#1193629).\n- cifs: fix double-fault crash during ntlmssp (bsc#1193629).\n- cifs: fix lock length calculation (bsc#1193629).\n- cifs: fix memory leaks in session setup (bsc#1193629).\n- cifs: fix missing unlock in cifs_file_copychunk_range() (git-fixes).\n- cifs: fix race condition with delayed threads (bsc#1193629).\n- cifs: fix skipping to incorrect offset in emit_cached_dirents (bsc#1193629).\n- cifs: fix small mempool leak in SMB2_negotiate() (bsc#1193629).\n- cifs: fix static checker warning (bsc#1193629).\n- cifs: fix uninitialised var in smb2_compound_op() (bsc#1193629).\n- cifs: fix use-after-free caused by invalid pointer `hostname` (bsc#1193629).\n- cifs: fix use-after-free on the link name (bsc#1193629).\n- cifs: fix wrong unlock before return from cifs_tree_connect() (bsc#1193629).\n- cifs: improve handlecaching (bsc#1193629).\n- cifs: improve symlink handling for smb2+ (bsc#1193629).\n- cifs: lease key is uninitialized in smb1 paths (bsc#1193629).\n- cifs: lease key is uninitialized in two additional functions when smb1 (bsc#1193629).\n- cifs: list_for_each() -\u003e list_for_each_entry() (bsc#1193629).\n- cifs: misc: fix spelling typo in comment (bsc#1193629).\n- cifs: move from strlcpy with unused retval to strscpy (bsc#1193629).\n- cifs: periodically query network interfaces from server (bsc#1193629).\n- cifs: populate empty hostnames for extra channels (bsc#1193629).\n- cifs: prevent copying past input buffer boundaries (bsc#1193629).\n- cifs: remove \u0027cifs_\u0027 prefix from init/destroy mids functions (bsc#1193629).\n- cifs: remove initialization value (bsc#1193629).\n- cifs: remove minor build warning (bsc#1193629).\n- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1193629).\n- cifs: remove remaining build warnings (bsc#1193629).\n- cifs: remove some camelCase and also some static build warnings (bsc#1193629).\n- cifs: remove unnecessary (void*) conversions (bsc#1193629).\n- cifs: remove unnecessary locking of chan_lock while freeing session (bsc#1193629).\n- cifs: remove unnecessary type castings (bsc#1193629).\n- cifs: remove unused server parameter from calc_smb_size() (bsc#1193629).\n- cifs: remove useless DeleteMidQEntry() (bsc#1193629).\n- cifs: remove useless parameter \u0027is_fsctl\u0027 from SMB2_ioctl() (bsc#1193629).\n- cifs: replace kfree() with kfree_sensitive() for sensitive data (bsc#1193629).\n- cifs: return correct error in -\u003ecalc_signature() (bsc#1193629).\n- cifs: return errors during session setup during reconnects (bsc#1193629).\n- cifs: revalidate mapping when doing direct writes (bsc#1193629).\n- cifs: secmech: use shash_desc directly, remove sdesc (bsc#1193629).\n- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir (bsc#1193629).\n- cifs: skip extra NULL byte in filenames (bsc#1193629).\n- cifs: store a pointer to a fid in the cfid structure instead of the struct (bsc#1193629).\n- cifs: truncate the inode and mapping when we simulate fcollapse (bsc#1193629).\n- cifs: update cifs_ses::ip_addr after failover (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: use ALIGN() and round_up() macros (bsc#1193629).\n- cifs: use LIST_HEAD() and list_move() to simplify code (bsc#1193629).\n- cifs: when a channel is not found for server, log its connection id (bsc#1193629).\n- cifs: when insecure legacy is disabled shrink amount of SMB1 code (bsc#1193629).\n- clocksource/drivers/hyperv: add data structure for reference TSC MSR (git-fixes).\n- cpufreq: intel_pstate: Handle no_turbo in frequency invariance (jsc#PED-849).\n- cpufreq: intel_pstate: Support Sapphire Rapids OOB mode (jsc#PED-849).\n- cpuidle: intel_idle: Drop redundant backslash at line end (jsc#PED-1936).\n- dm btree remove: fix use after free in rebalance_children() (git-fixes).\n- dm crypt: make printing of the key constant-time (git-fixes).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm integrity: fix memory corruption when tag_size is less than digest size (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm stats: add cond_resched when looping over entries (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm: fix double accounting of flush with data (git-fixes).\n- dm: interlock pending dm_io and dm_wait_for_bios_completion (git-fixes).\n- dm: properly fix redundant bio-based IO accounting (git-fixes).\n- dm: remove unnecessary assignment statement in alloc_dev() (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- dm: revert partial fix for redundant bio-based IO accounting (git-fixes).\n- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).\n- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).\n- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).\n- dmaengine: at_hdmac: Do not call the complete callback on device_terminate_all (git-fixes).\n- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).\n- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).\n- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over descriptor (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over the active list (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency problems by removing atc_complete_all() (git-fixes).\n- dmaengine: at_hdmac: Fix descriptor handling when issuing it to hardware (git-fixes).\n- dmaengine: at_hdmac: Fix impossible condition (git-fixes).\n- dmaengine: at_hdmac: Fix premature completion of desc in issue_pending (git-fixes).\n- dmaengine: at_hdmac: Free the memset buf without holding the chan lock (git-fixes).\n- dmaengine: at_hdmac: Protect atchan-\u003estatus with the channel lock (git-fixes).\n- dmaengine: at_hdmac: Start transfer for cyclic channels in issue_pending (git-fixes).\n- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).\n- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).\n- dmaengine: ti: k3-udma-glue: fix memory leak when register device fail (git-fixes).\n- docs, kprobes: Fix the wrong location of Kprobes (git-fixes).\n- docs/core-api: expand Fedora instructions for GCC plugins (git-fixes).\n- drm/amd/display: Add HUBP surface flip interrupt handler (git-fixes).\n- drm/amdgpu: disable BACO on special BEIGE_GOBY card (git-fixes).\n- drm/amdgpu: set vm_update_mode=0 as default for Sienna Cichlid in SRIOV case (git-fixes).\n- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() (git-fixes).\n- drm/amdkfd: Migrate in CPU page fault use current mm (git-fixes).\n- drm/amdkfd: avoid recursive lock in migrations back to RAM (git-fixes).\n- drm/amdkfd: handle CPU fault on COW mapping (git-fixes).\n- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).\n- drm/hyperv: Add ratelimit on error message (git-fixes).\n- drm/hyperv: Do not overwrite dirt_needed value set by host (git-fixes).\n- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).\n- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).\n- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).\n- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).\n- drm/msm/hdmi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/hdmi: fix IRQ lifetime (git-fixes).\n- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).\n- drm/rockchip: dsi: Force synchronous probe (git-fixes).\n- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).\n- drm/vc4: kms: Fix IS_ERR() vs NULL check for vc4_kms (git-fixes).\n- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).\n- e1000e: Fix TX dispatch condition (git-fixes).\n- e100: Fix possible use after free in e100_xmit_prepare (git-fixes).\n- efi: random: Use \u0027ACPI reclaim\u0027 memory for random seed (git-fixes).\n- efi: random: reduce seed size to 32 bytes (git-fixes).\n- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).\n- firmware: coreboot: Register bus in module init (git-fixes).\n- fm10k: Fix error handling in fm10k_init_module() (git-fixes).\n- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- fuse: add file_modified() to fallocate (bsc#1205332).\n- fuse: fix readdir cache race (bsc#1205331).\n- fuse: lock inode unconditionally in fuse_fallocate() (bsc#1206273).\n- gpio: amd8111: Fix PCI device reference count leak (git-fixes).\n- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).\n- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).\n- hv_sock: Add validation for untrusted Hyper-V values (git-fixes).\n- hv_sock: Check hv_pkt_iter_first_raw()\u0027s return value (git-fixes).\n- hv_sock: Copy packets sent by Hyper-V out of the ring buffer (git-fixes).\n- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).\n- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).\n- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).\n- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).\n- hwmon: (ina3221) Fix shunt sum critical calculation (git-fixes).\n- hwmon: (ltc2947) fix temperature scaling (git-fixes).\n- i2c: i801: add lis3lv02d\u0027s I2C address for Vostro 5568 (git-fixes).\n- i2c: imx: Only DMA messages with I2C_M_DMA_SAFE flag set (git-fixes).\n- i2c: npcm7xx: Fix error handling in npcm_i2c_init() (git-fixes).\n- i2c: tegra: Allocate DMA memory for DMA engine (git-fixes).\n- i2c: xiic: Add platform module alias (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- ieee802154: cc2520: Fix error return code in cc2520_hw_init() (git-fixes).\n- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).\n- iio: adc: mp2629: fix potential array out of bound access (git-fixes).\n- iio: adc: mp2629: fix wrong comparison of channel (git-fixes).\n- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).\n- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).\n- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).\n- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).\n- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).\n- iio: ms5611: Simplify IO callback parameters (git-fixes).\n- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).\n- iio: pressure: ms5611: fixed value compensation bug (git-fixes).\n- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).\n- init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash (git-fixes).\n- intel_idle: Add AlderLake support (jsc#PED-824).\n- intel_idle: Fix SPR C6 optimization (jsc#PED-824 jsc#PED-1936).\n- intel_idle: Fix the \u0027preferred_cstates\u0027 module parameter (jsc#PED-824 jsc#PED-1936).\n- intel_idle: make SPR C1 and C1E be independent (jsc#PED-1936).\n- io-wq: Remove duplicate code in io_workqueue_create() (bnc#1205113).\n- io-wq: do not retry task_work creation failure on fatal conditions (bnc#1205113).\n- io-wq: ensure we exit if thread group is exiting (git-fixes).\n- io-wq: exclusively gate signal based exit on get_signal() return (git-fixes).\n- io-wq: fix cancellation on create-worker failure (bnc#1205113).\n- io-wq: fix silly logic error in io_task_work_match() (bnc#1205113).\n- io_uring: correct __must_hold annotation (git-fixes).\n- io_uring: drop ctx-\u003euring_lock before acquiring sqd-\u003elock (git-fixes).\n- io_uring: ensure IORING_REGISTER_IOWQ_MAX_WORKERS works with SQPOLL (git-fixes).\n- io_uring: fix io_timeout_remove locking (git-fixes).\n- io_uring: fix missing mb() before waitqueue_active (git-fixes).\n- io_uring: fix missing sigmask restore in io_cqring_wait() (git-fixes).\n- io_uring: fix possible poll event lost in multi shot mode (git-fixes).\n- io_uring: pin SQPOLL data before unlocking ring lock (git-fixes).\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- kABI: Fix kABI after \u0027KVM: x86/pmu: Use different raw event masks for AMD and Intel\u0027 (git-fixes).\n- kbuild: Unify options for BTF generation for vmlinux and modules (bsc#1204693).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).\n- mac80211: radiotap: Use BIT() instead of shifts (git-fixes).\n- mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (git-fixes).\n- macsec: Fix invalid error code set (git-fixes).\n- macsec: add missing attribute validation for offload (git-fixes).\n- macsec: clear encryption keys from the stack after setting up offload (git-fixes).\n- macsec: delete new rxsc when offload fails (git-fixes).\n- macsec: fix detection of RXSCs when toggling offloading (git-fixes).\n- macsec: fix secy-\u003en_rx_sc accounting (git-fixes).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).\n- media: cros-ec-cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).\n- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).\n- media: rkisp1: Do not pass the quantization to rkisp1_csm_config() (git-fixes).\n- media: rkisp1: Initialize color space on resizer sink and source pads (git-fixes).\n- media: rkisp1: Use correct macro for gradient registers (git-fixes).\n- media: rkisp1: Zero v4l2_subdev_format fields in when validating links (git-fixes).\n- media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: v4l: subdev: Fail graciously when getting try data for NULL state (git-fixes).\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).\n- mmc: core: Fix ambiguous TRIM and DISCARD arg (git-fixes).\n- mmc: core: properly select voltage range without power cycle (git-fixes).\n- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).\n- mmc: mmc_test: Fix removal of debugfs file (git-fixes).\n- mmc: sdhci-brcmstb: Enable Clock Gating to save power (git-fixes).\n- mmc: sdhci-brcmstb: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-brcmstb: Re-organize flags (git-fixes).\n- mmc: sdhci-esdhc-imx: correct CQHCI exit halt state check (git-fixes).\n- mmc: sdhci-esdhc-imx: use the correct host caps for MMC_CAP_8_BIT_DATA (git-fixes).\n- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).\n- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).\n- mmc: sdhci-sprd: Fix no reset data and command after voltage switch (git-fixes).\n- mmc: sdhci-tegra: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci_am654: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mms: sdhci-esdhc-imx: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mtd: parsers: bcm47xxpart: Fix halfblock reads (git-fixes).\n- mtd: parsers: bcm47xxpart: print correct offset on read error (git-fixes).\n- mtd: spi-nor: intel-spi: Disable write protection only if asked (git-fixes).\n- nbd: Fix incorrect error handle when first_minor is illegal in nbd_dev_add (git-fixes).\n- net/smc: Avoid overwriting the copies of clcsock callback functions (git-fixes).\n- net/smc: Fix an error code in smc_lgr_create() (git-fixes).\n- net/smc: Fix possible access to freed memory in link clear (git-fixes).\n- net/smc: Fix possible leaked pernet namespace in smc_init() (git-fixes).\n- net/smc: Fix slab-out-of-bounds issue in fallback (git-fixes).\n- net/smc: Fix sock leak when release after smc_shutdown() (git-fixes).\n- net/smc: Forward wakeup to smc socket waitqueue after fallback (git-fixes).\n- net/smc: Only save the original clcsock callback functions (git-fixes).\n- net/smc: Send directly when TCP_CORK is cleared (git-fixes).\n- net/smc: kABI workarounds for struct smc_link (git-fixes).\n- net/smc: kABI workarounds for struct smc_sock (git-fixes).\n- net/smc: send directly on setting TCP_NODELAY (git-fixes).\n- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).\n- net: ethernet: nixge: fix NULL dereference (git-fixes).\n- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).\n- net: ethernet: ti: am65-cpsw: fix error handling in am65_cpsw_nuss_probe() (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: mdio: fix unbalanced fwnode reference count in mdio_device_release() (git-fixes).\n- net: mdiobus: fix unbalanced node reference count (git-fixes).\n- net: phy: fix null-ptr-deref while probe() failed (git-fixes).\n- net: phy: marvell: add sleep time after enabling the loopback bit (git-fixes).\n- net: phy: mscc: macsec: clear encryption keys when freeing a flow (git-fixes).\n- net: smsc95xx: add support for Microchip EVB-LAN8670-USB (git-fixes).\n- net: stmmac: work around sporadic tx issue on link-up (git-fixes).\n- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).\n- net: thunderbolt: fix memory leak in tbnet_open() (git-fixes).\n- net: thunderx: Fix the ACPI memory leak (git-fixes).\n- net: usb: qmi_wwan: add Telit 0x103a composition (git-fixes).\n- net: wwan: iosm: fix dma_alloc_coherent incompatible pointer type (git-fixes).\n- net: wwan: iosm: fix kernel test robot reported error (git-fixes).\n- nfc/nci: fix race with opening and closing (git-fixes).\n- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).\n- nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() (git-fixes).\n- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).\n- nfc: st-nci: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).\n- nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() (git-fixes).\n- nilfs2: fix deadlock in nilfs_count_free_blocks() (git-fixes).\n- nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty (git-fixes).\n- nilfs2: fix use-after-free bug of ns_writer on remount (git-fixes).\n- nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure (git-fixes).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- parport_pc: Avoid FIFO port location truncation (git-fixes).\n- phy: ralink: mt7621-pci: add sentinel to quirks table (git-fixes).\n- phy: stm32: fix an error code in probe (git-fixes).\n- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).\n- pinctrl: intel: Save and restore pins in \u0027direct IRQ\u0027 mode (git-fixes).\n- pinctrl: rockchip: list all pins in a possible mux route for PX30 (git-fixes).\n- pinctrl: single: Fix potential division by zero (git-fixes).\n- platform/surface: aggregator: Do not check for repeated unsequenced packets (git-fixes).\n- platform/x86/intel/pmt: Sapphire Rapids PMT errata fix (jsc#PED-2684 bsc#1205683).\n- platform/x86/intel: hid: add quirk to support Surface Go 3 (git-fixes).\n- platform/x86/intel: pmc: Do not unconditionally attach Intel PMC when virtualized (git-fixes).\n- platform/x86: acer-wmi: Enable SW_TABLET_MODE on Switch V 10 (SW5-017) (git-fixes).\n- platform/x86: asus-wmi: add missing pci_dev_put() in asus_wmi_set_xusb2pr() (git-fixes).\n- platform/x86: hp-wmi: Ignore Smart Experience App event (git-fixes).\n- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).\n- platform/x86: ideapad-laptop: Disable touchpad_switch (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the RCA Cambio W101 v2 2-in-1 (git-fixes).\n- powerpc/64: Fix build failure with allyesconfig in book3s_64_entry.S (bsc#1194869).\n- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).\n- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).\n- powerpc/pseries/vas: Declare pseries_vas_fault_thread_fn() as static (bsc#1194869).\n- proc: avoid integer type confusion in get_proc_long (git-fixes).\n- proc: proc_skip_spaces() shouldn\u0027t think it is working on C strings (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- regulator: core: fix UAF in destroy_regulator() (git-fixes).\n- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).\n- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).\n- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205427 LTC#200502).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (bsc#1205427 LTC#200502).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).\n- s390: fix nospec table alignments (git-fixes).\n- sched: Clear ttwu_pending after enqueue_task() (git fixes (sched/core)).\n- sched: Disable sched domain debugfs creation on ppc64 unless sched_verbose is specified (bnc#1205653).\n- scripts/faddr2line: Fix regression in name resolution on ppc64le (git-fixes).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: megaraid_sas: Correct value passed to scsi_device_lookup() (git-fixes).\n- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).\n- scsi: qedf: Populate sysfs attributes for vport (git-fixes).\n- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix typo in comment (git-fixes).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: remove an extraneous \u0027to\u0027 in a comment (git-fixes).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- selftests/intel_pstate: fix build for ARCH=x86_64 (git-fixes).\n- selftests: mptcp: fix mibit vs mbit mix up (git-fixes).\n- selftests: mptcp: make sendfile selftest work (git-fixes).\n- selftests: mptcp: more stable simult_flows tests (git-fixes).\n- selftests: rtnetlink: correct xfrm policy rule in kci_test_ipsec_offload (git-fixes).\n- serial: 8250: 8250_omap: Avoid RS485 RTS glitch on -\u003eset_termios() (git-fixes).\n- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).\n- serial: 8250: Flush DMA Rx on RLSI (git-fixes).\n- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).\n- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).\n- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).\n- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).\n- serial: imx: Add missing .thaw_noirq hook (git-fixes).\n- siox: fix possible memory leak in siox_device_add() (git-fixes).\n- slimbus: stream: correct presence rate frequencies (git-fixes).\n- smb2: small refactor in smb2_check_message() (bsc#1193629).\n- smb3: Move the flush out of smb2_copychunk_range() into its callers (bsc#1193629).\n- smb3: add dynamic trace points for tree disconnect (bsc#1193629).\n- smb3: add trace point for SMB2_set_eof (bsc#1193629).\n- smb3: allow deferred close timeout to be configurable (bsc#1193629).\n- smb3: check xattr value length earlier (bsc#1193629).\n- smb3: clarify multichannel warning (bsc#1193629).\n- smb3: do not log confusing message when server returns no network interfaces (bsc#1193629).\n- smb3: fix empty netname context on secondary channels (bsc#1193629).\n- smb3: fix oops in calculating shash_setkey (bsc#1193629).\n- smb3: fix temporary data corruption in collapse range (bsc#1193629).\n- smb3: fix temporary data corruption in insert range (bsc#1193629).\n- smb3: improve SMB3 change notification support (bsc#1193629).\n- smb3: interface count displayed incorrectly (bsc#1193629).\n- smb3: missing inode locks in punch hole (bsc#1193629).\n- smb3: missing inode locks in zero range (bsc#1193629).\n- smb3: must initialize two ACL struct fields to zero (bsc#1193629).\n- smb3: remove unneeded null check in cifs_readdir (bsc#1193629).\n- smb3: rename encryption/decryption TFMs (bsc#1193629).\n- smb3: use filemap_write_and_wait_range instead of filemap_write_and_wait (bsc#1193629).\n- smb3: use netname when available on secondary channels (bsc#1193629).\n- smb3: workaround negprot bug in some Samba servers (bsc#1193629).\n- soc: imx8m: Enable OCOTP clock before reading the register (git-fixes).\n- soundwire: intel: Initialize clock stop timeout (bsc#1205507).\n- soundwire: qcom: check for outanding writes before doing a read (git-fixes).\n- soundwire: qcom: reinit broadcast completion (git-fixes).\n- speakup: fix a segfault caused by switching consoles (git-fixes).\n- spi: dw-dma: decrease reference count in dw_spi_dma_init_mfld() (git-fixes).\n- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).\n- spi: stm32: Print summary \u0027callbacks suppressed\u0027 message (git-fixes).\n- spi: stm32: fix stm32_spi_prepare_mbr() that halves spi clk for every run (git-fixes).\n- spi: tegra210-quad: Fix duplicate resource error (git-fixes).\n- thunderbolt: Add DP OUT resource when DP tunnel is discovered (git-fixes).\n- tools: hv: Remove an extraneous \u0027the\u0027 (git-fixes).\n- tools: hv: kvp: remove unnecessary (void*) conversions (git-fixes).\n- tools: iio: iio_generic_buffer: Fix read size (git-fixes).\n- tracing/ring-buffer: Have polling block on watermark (git-fixes).\n- tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() (git-fixes).\n- tracing: Fix memory leak in tracing_read_pipe() (git-fixes).\n- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).\n- tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit() (git-fixes).\n- tty: n_gsm: fix sleep-in-atomic-context bug in gsm_control_send (git-fixes).\n- tty: serial: fsl_lpuart: do not break the on-going transfer when global reset (git-fixes).\n- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- usb: cdns3: host: fix endless superspeed hub port reset (git-fixes).\n- usb: cdnsp: Fix issue with Clear Feature Halt Endpoint (git-fixes).\n- usb: cdnsp: fix issue with ZLP - added TD_SIZE = 1 (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).\n- usb: dwc3: gadget: Return -ESHUTDOWN on ep disable (git-fixes).\n- usb: dwc3: gadget: conditionally remove requests (git-fixes).\n- usb: smsc: use eth_hw_addr_set() (git-fixes).\n- usb: typec: mux: Enter safe mode only when pins need to be reconfigured (git-fixes).\n- usb: xhci-mtk: check boundary before check tt (git-fixes).\n- usb: xhci-mtk: update fs bus bandwidth by bw_budget_table (git-fixes).\n- usbnet: smsc95xx: Do not reset PHY behind PHY driver\u0027s back (git-fixes).\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027\n- video/fbdev/stifb: Implement the stifb_fillrect() function (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- vmxnet3: correctly report encapsulated LRO packet (git-fixes).\n- vmxnet3: use correct intrConf reference when using extended queues (git-fixes).\n- wifi: airo: do not assign -1 to unsigned char (git-fixes).\n- wifi: ath11k: Fix QCN9074 firmware boot on x86 (git-fixes).\n- wifi: ath11k: avoid deadlock during regulatory update in ath11k_regd_update() (git-fixes).\n- wifi: cfg80211: do not allow multi-BSSID in S1G (git-fixes).\n- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).\n- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).\n- wifi: cfg80211: silence a sparse RCU warning (git-fixes).\n- wifi: mac80211: Fix ack frame idr leak when mesh has no route (git-fixes).\n- wifi: mac80211: fix memory free error when registering wiphy fail (git-fixes).\n- wifi: mac80211_hwsim: fix debugfs attribute ps with rc table support (git-fixes).\n- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).\n- wifi: wext: use flex array destination for memcpy() (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute (git-fixes).\n- wifi: wilc1000: validate number of channels (git-fixes).\n- wifi: wilc1000: validate pairwise and authentication suite offsets (git-fixes).\n- x86/Xen: streamline (and fix) PV CPU enumeration (git-fixes).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/entry: Work around Clang __bdos() bug (git-fixes).\n- x86/extable: Extend extable functionality (git-fixes).\n- x86/fpu: Drop fpregs lock before inheriting FPU permissions (bnc#1205282).\n- x86/futex: Remove .fixup usage (git-fixes).\n- x86/hyperv: Disable hardlockup detector by default in Hyper-V guests (git-fixes).\n- x86/hyperv: Fix \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: Update \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: fix invalid writes to MSRs during root partition kexec (git-fixes).\n- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/uaccess: Implement macros for CMPXCHG on user addresses (git-fixes).\n- xen/gntdev: Accommodate VMA splitting (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu\u003e=32 (git-fixes).\n- xfs: convert XLOG_FORCED_SHUTDOWN() to xlog_is_shutdown() (git-fixes).\n- xfs: fix perag reference leak on iteration race with growfs (git-fixes).\n- xfs: fix xfs_ifree() error handling to not leak perag ref (git-fixes).\n- xfs: reserve quota for dir expansion when linking/unlinking files (bsc#1205616).\n- xfs: reserve quota for target dir expansion when renaming files (bsc#1205679).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4504,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-4504,openSUSE-SLE-15.4-2022-4504",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4504-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4504-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224504-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4504-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164051",
"url": "https://bugzilla.suse.com/1164051"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1189297",
"url": "https://bugzilla.suse.com/1189297"
},
{
"category": "self",
"summary": "SUSE Bug 1190256",
"url": "https://bugzilla.suse.com/1190256"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1202341",
"url": "https://bugzilla.suse.com/1202341"
},
{
"category": "self",
"summary": "SUSE Bug 1203183",
"url": "https://bugzilla.suse.com/1203183"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204693",
"url": "https://bugzilla.suse.com/1204693"
},
{
"category": "self",
"summary": "SUSE Bug 1204810",
"url": "https://bugzilla.suse.com/1204810"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1205007",
"url": "https://bugzilla.suse.com/1205007"
},
{
"category": "self",
"summary": "SUSE Bug 1205100",
"url": "https://bugzilla.suse.com/1205100"
},
{
"category": "self",
"summary": "SUSE Bug 1205111",
"url": "https://bugzilla.suse.com/1205111"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205149",
"url": "https://bugzilla.suse.com/1205149"
},
{
"category": "self",
"summary": "SUSE Bug 1205153",
"url": "https://bugzilla.suse.com/1205153"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205331",
"url": "https://bugzilla.suse.com/1205331"
},
{
"category": "self",
"summary": "SUSE Bug 1205428",
"url": "https://bugzilla.suse.com/1205428"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205653",
"url": "https://bugzilla.suse.com/1205653"
},
{
"category": "self",
"summary": "SUSE Bug 1205744",
"url": "https://bugzilla.suse.com/1205744"
},
{
"category": "self",
"summary": "SUSE Bug 1205764",
"url": "https://bugzilla.suse.com/1205764"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1205882",
"url": "https://bugzilla.suse.com/1205882"
},
{
"category": "self",
"summary": "SUSE Bug 1205993",
"url": "https://bugzilla.suse.com/1205993"
},
{
"category": "self",
"summary": "SUSE Bug 1206035",
"url": "https://bugzilla.suse.com/1206035"
},
{
"category": "self",
"summary": "SUSE Bug 1206036",
"url": "https://bugzilla.suse.com/1206036"
},
{
"category": "self",
"summary": "SUSE Bug 1206037",
"url": "https://bugzilla.suse.com/1206037"
},
{
"category": "self",
"summary": "SUSE Bug 1206046",
"url": "https://bugzilla.suse.com/1206046"
},
{
"category": "self",
"summary": "SUSE Bug 1206047",
"url": "https://bugzilla.suse.com/1206047"
},
{
"category": "self",
"summary": "SUSE Bug 1206051",
"url": "https://bugzilla.suse.com/1206051"
},
{
"category": "self",
"summary": "SUSE Bug 1206056",
"url": "https://bugzilla.suse.com/1206056"
},
{
"category": "self",
"summary": "SUSE Bug 1206057",
"url": "https://bugzilla.suse.com/1206057"
},
{
"category": "self",
"summary": "SUSE Bug 1206113",
"url": "https://bugzilla.suse.com/1206113"
},
{
"category": "self",
"summary": "SUSE Bug 1206114",
"url": "https://bugzilla.suse.com/1206114"
},
{
"category": "self",
"summary": "SUSE Bug 1206147",
"url": "https://bugzilla.suse.com/1206147"
},
{
"category": "self",
"summary": "SUSE Bug 1206149",
"url": "https://bugzilla.suse.com/1206149"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE Bug 1206273",
"url": "https://bugzilla.suse.com/1206273"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3176 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3566 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3707 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42328 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42329 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45869 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45888 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-16T12:28:51Z",
"generator": {
"date": "2022-12-16T12:28:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4504-1",
"initial_release_date": "2022-12-16T12:28:51Z",
"revision_history": [
{
"date": "2022-12-16T12:28:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product_id": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product_id": "dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product_id": "gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "kernel-azure-5.14.21-150400.14.28.1.aarch64",
"product_id": "kernel-azure-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"product_id": "kernel-azure-devel-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"product_id": "kernel-azure-extra-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"product_id": "kernel-azure-optional-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"product_id": "kernel-syms-azure-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product_id": "kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product_id": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"product_id": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"product": {
"name": "kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"product_id": "kernel-devel-azure-5.14.21-150400.14.28.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"product": {
"name": "kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"product_id": "kernel-source-azure-5.14.21-150400.14.28.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product_id": "dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product_id": "gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "kernel-azure-5.14.21-150400.14.28.1.x86_64",
"product_id": "kernel-azure-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"product_id": "kernel-azure-devel-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"product_id": "kernel-azure-extra-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"product_id": "kernel-azure-optional-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"product_id": "kernel-syms-azure-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product_id": "kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.28.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.28.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.28.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.28.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.14.21-150400.14.28.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch"
},
"product_reference": "kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.14.21-150400.14.28.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch"
},
"product_reference": "kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.28.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.28.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.14.21-150400.14.28.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch"
},
"product_reference": "kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.14.21-150400.14.28.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch"
},
"product_reference": "kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64"
},
"product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-3176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3176"
}
],
"notes": [
{
"category": "general",
"text": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn\u0027t handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3176",
"url": "https://www.suse.com/security/cve/CVE-2022-3176"
},
{
"category": "external",
"summary": "SUSE Bug 1203391 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "external",
"summary": "SUSE Bug 1203511 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "important"
}
],
"title": "CVE-2022-3176"
},
{
"cve": "CVE-2022-3566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3566"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3566",
"url": "https://www.suse.com/security/cve/CVE-2022-3566"
},
{
"category": "external",
"summary": "SUSE Bug 1204405 for CVE-2022-3566",
"url": "https://bugzilla.suse.com/1204405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3643"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3643",
"url": "https://www.suse.com/security/cve/CVE-2022-3643"
},
{
"category": "external",
"summary": "SUSE Bug 1206113 for CVE-2022-3643",
"url": "https://bugzilla.suse.com/1206113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-3707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3707"
}
],
"notes": [
{
"category": "general",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3707",
"url": "https://www.suse.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "SUSE Bug 1204780 for CVE-2022-3707",
"url": "https://bugzilla.suse.com/1204780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4129"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4129",
"url": "https://www.suse.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "SUSE Bug 1205711 for CVE-2022-4129",
"url": "https://bugzilla.suse.com/1205711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42328"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42328",
"url": "https://www.suse.com/security/cve/CVE-2022-42328"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42328",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42329"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42329",
"url": "https://www.suse.com/security/cve/CVE-2022-42329"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42329",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45869"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45869",
"url": "https://www.suse.com/security/cve/CVE-2022-45869"
},
{
"category": "external",
"summary": "SUSE Bug 1205882 for CVE-2022-45869",
"url": "https://bugzilla.suse.com/1205882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-45869"
},
{
"cve": "CVE-2022-45888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45888"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45888",
"url": "https://www.suse.com/security/cve/CVE-2022-45888"
},
{
"category": "external",
"summary": "SUSE Bug 1205764 for CVE-2022-45888",
"url": "https://bugzilla.suse.com/1205764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "low"
}
],
"title": "CVE-2022-45888"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4513-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150200_24_126 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4513,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4513,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4514",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4513-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4513-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224513-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4513-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2022-12-16T19:06:47Z",
"generator": {
"date": "2022-12-16T19:06:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4513-1",
"initial_release_date": "2022-12-16T19:06:47Z",
"revision_history": [
{
"date": "2022-12-16T19:06:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_115-preempt-9-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_115-preempt-9-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_115-preempt-9-150200.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4573-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bsc#1203322).\n- CVE-2022-3545: Fixed a use-after-free vulnerability is area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).\n- CVE-2022-2153: Fixed a NULL pointer dereference in KVM when attempting to set a SynIC IRQ (bsc#1200788).\n- CVE-2022-33981: Fixed a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function (bsc#1200692).\n\nThe following non-security bugs were fixed:\n\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- sunrpc: Re-purpose trace_svc_process (bsc#1205006).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- x86/hyperv: Set pv_info.name to \u0027Hyper-V\u0027 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4573,SUSE-SLE-Module-Live-Patching-15-2022-4573,SUSE-SLE-Product-HA-15-2022-4573,SUSE-SLE-Product-HPC-15-2022-4573,SUSE-SLE-Product-SLES-15-2022-4573,SUSE-SLE-Product-SLES_SAP-15-2022-4573",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4573-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4573-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224573-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4573-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1198702",
"url": "https://bugzilla.suse.com/1198702"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200788",
"url": "https://bugzilla.suse.com/1200788"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1202686",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203183",
"url": "https://bugzilla.suse.com/1203183"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203322",
"url": "https://bugzilla.suse.com/1203322"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE Bug 1204168",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "self",
"summary": "SUSE Bug 1204170",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204355",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "self",
"summary": "SUSE Bug 1204402",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204415",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204432",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204479",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204635",
"url": "https://bugzilla.suse.com/1204635"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1205006",
"url": "https://bugzilla.suse.com/1205006"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1206113",
"url": "https://bugzilla.suse.com/1206113"
},
{
"category": "self",
"summary": "SUSE Bug 1206114",
"url": "https://bugzilla.suse.com/1206114"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4037 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2153 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3521 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42328 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42329 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-19T16:56:41Z",
"generator": {
"date": "2022-12-19T16:56:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4573-1",
"initial_release_date": "2022-12-19T16:56:41Z",
"revision_history": [
{
"date": "2022-12-19T16:56:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-default-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-syms-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150000.150.109.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150000.150.109.1.noarch",
"product_id": "kernel-devel-4.12.14-150000.150.109.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150000.150.109.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150000.150.109.1.noarch",
"product_id": "kernel-docs-4.12.14-150000.150.109.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150000.150.109.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150000.150.109.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150000.150.109.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150000.150.109.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150000.150.109.1.noarch",
"product_id": "kernel-macros-4.12.14-150000.150.109.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150000.150.109.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150000.150.109.1.noarch",
"product_id": "kernel-source-4.12.14-150000.150.109.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150000.150.109.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150000.150.109.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150000.150.109.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-default-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-default-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-default-base-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-default-man-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-syms-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150000.150.109.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.109.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-debug-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-default-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-syms-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.109.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4037"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4037",
"url": "https://www.suse.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2021-4037",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2022-2153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2153"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2153",
"url": "https://www.suse.com/security/cve/CVE-2022-2153"
},
{
"category": "external",
"summary": "SUSE Bug 1200788 for CVE-2022-2153",
"url": "https://bugzilla.suse.com/1200788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-3521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3521"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3521",
"url": "https://www.suse.com/security/cve/CVE-2022-3521"
},
{
"category": "external",
"summary": "SUSE Bug 1204355 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3542",
"url": "https://www.suse.com/security/cve/CVE-2022-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1204402 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3594"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3594",
"url": "https://www.suse.com/security/cve/CVE-2022-3594"
},
{
"category": "external",
"summary": "SUSE Bug 1204479 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3629"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3629",
"url": "https://www.suse.com/security/cve/CVE-2022-3629"
},
{
"category": "external",
"summary": "SUSE Bug 1204635 for CVE-2022-3629",
"url": "https://bugzilla.suse.com/1204635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "low"
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3643"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3643",
"url": "https://www.suse.com/security/cve/CVE-2022-3643"
},
{
"category": "external",
"summary": "SUSE Bug 1206113 for CVE-2022-3643",
"url": "https://bugzilla.suse.com/1206113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-40307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40307"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40307",
"url": "https://www.suse.com/security/cve/CVE-2022-40307"
},
{
"category": "external",
"summary": "SUSE Bug 1203322 for CVE-2022-40307",
"url": "https://bugzilla.suse.com/1203322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42328"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42328",
"url": "https://www.suse.com/security/cve/CVE-2022-42328"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42328",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42329"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42329",
"url": "https://www.suse.com/security/cve/CVE-2022-42329"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42329",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42703"
}
],
"notes": [
{
"category": "general",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42703",
"url": "https://www.suse.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "SUSE Bug 1204168 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "external",
"summary": "SUSE Bug 1204170 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "external",
"summary": "SUSE Bug 1206463 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1206463"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "important"
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_109-default-1-150000.1.5.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.109.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:56:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4534-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_71 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4534,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4531,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4534",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4534-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4534-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224534-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4534-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-17T18:05:08Z",
"generator": {
"date": "2022-12-17T18:05:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4534-1",
"initial_release_date": "2022-12-17T18:05:08Z",
"revision_history": [
{
"date": "2022-12-17T18:05:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_71-preempt-9-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_71-preempt-9-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_71-preempt-9-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4614-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bsc#1203322).\n- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).\n- CVE-2022-3625: Fixed a user-after-free vulnerability in devlink_param_set/devlink_param_get of the file net/core/devlink.c (bsc#1204637).\n- CVE-2022-3535: Fixed a memory leak in mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bsc#1204417).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-39189: Fixed an issue were an unprivileged guest users can compromise the guest kernel because TLB flush operations were mishandled in certain KVM_VCPU_PREEMPTED situations (bsc#1203066).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).\n- CVE-2022-2153: Fixed a NULL pointer dereference in the KVM subsystem, when attempting to set a SynIC IRQ (bsc#1200788).\n- CVE-2022-2978: Fixed a use-after-free in the NILFS file system (bsc#1202700).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017).\n- Drivers: hv: vmbus: Allow cleanup of VMBUS_CONNECT_CPU if disconnected (bsc#1204017).\n- Drivers: hv: vmbus: Always handle the VMBus messages on CPU0 (bsc#1204017).\n- Drivers: hv: vmbus: Do not bind the offer\u0026rescind works to a specific CPU (bsc#1204017).\n- Drivers: hv: vmbus: Drop error message when \u0027No request id available\u0027 (bsc#1204017).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).\n- Drivers: hv: vmbus: Move __vmbus_open() (bsc#1204017).\n- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).\n- Drivers: hv: vmbus: Replace smp_store_mb() with virt_store_mb() (bsc#1204017).\n- Drivers: hv: vmbus: Replace the per-CPU channel lists with a global array of channels (bsc#1204017).\n- Drivers: hv: vmbus: Use a spin lock for synchronizing channel scheduling vs. channel removal (bsc#1204017).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).\n- PCI: hv: Add hibernation support (bsc#1204446).\n- PCI: hv: Add validation for untrusted Hyper-V values (bsc#1204017).\n- PCI: hv: Drop msi_controller structure (bsc#1204446).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (bsc#1199365).\n- PCI: hv: Fix a race condition when removing the device (bsc#1204446).\n- PCI: hv: Fix hibernation in case interrupts are not re-created (bsc#1204446).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017, bsc#1203860).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).\n- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Prepare hv_compose_msi_msg() for the VMBus-channel-interrupt-to-vCPU reassignment functionality (bsc#1204017).\n- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).\n- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: hv: Support for create interrupt v3 (bsc#1204446).\n- PCI: hv: Use PCI_ERROR_RESPONSE to identify config read errors (bsc#1204446).\n- PCI: hv: Use struct_size() helper (bsc#1204446).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1204053 bsc#1201725).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_netvsc: Add error handling while switching data path (bsc#1204850).\n- hv_netvsc: Add the support of hibernation (bsc#1204017).\n- hv_netvsc: Add validation for untrusted Hyper-V values (bsc#1204017).\n- hv_netvsc: Cache the current data path to avoid duplicate call and message (bsc#1204017).\n- hv_netvsc: Check VF datapath when sending traffic to VF (bsc#1204017).\n- hv_netvsc: Fix hibernation for mlx5 VF driver (bsc#1204850).\n- hv_netvsc: Fix potential dereference of NULL pointer (bsc#1204017).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (bsc#1204017).\n- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).\n- hv_netvsc: Remove unnecessary round_up for recv_completion_cnt (bsc#1204017).\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (bsc#1204017).\n- hv_netvsc: Switch the data path at the right time during hibernation (bsc#1204850).\n- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).\n- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).\n- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).\n- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).\n- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).\n- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- xfs: reserve data and rt quota at the same time (bsc#1203496).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4614,SUSE-SLE-RT-12-SP5-2022-4614",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4614-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4614-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224614-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4614-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html"
},
{
"category": "self",
"summary": "SUSE Bug 1198702",
"url": "https://bugzilla.suse.com/1198702"
},
{
"category": "self",
"summary": "SUSE Bug 1199365",
"url": "https://bugzilla.suse.com/1199365"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1201725",
"url": "https://bugzilla.suse.com/1201725"
},
{
"category": "self",
"summary": "SUSE Bug 1202686",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "self",
"summary": "SUSE Bug 1202700",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203066",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "self",
"summary": "SUSE Bug 1203067",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "self",
"summary": "SUSE Bug 1203322",
"url": "https://bugzilla.suse.com/1203322"
},
{
"category": "self",
"summary": "SUSE Bug 1203391",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "self",
"summary": "SUSE Bug 1203496",
"url": "https://bugzilla.suse.com/1203496"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203860",
"url": "https://bugzilla.suse.com/1203860"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204053",
"url": "https://bugzilla.suse.com/1204053"
},
{
"category": "self",
"summary": "SUSE Bug 1204168",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "self",
"summary": "SUSE Bug 1204170",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204355",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "self",
"summary": "SUSE Bug 1204402",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204415",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "self",
"summary": "SUSE Bug 1204417",
"url": "https://bugzilla.suse.com/1204417"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204432",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204446",
"url": "https://bugzilla.suse.com/1204446"
},
{
"category": "self",
"summary": "SUSE Bug 1204470",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "self",
"summary": "SUSE Bug 1204479",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204575",
"url": "https://bugzilla.suse.com/1204575"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204635",
"url": "https://bugzilla.suse.com/1204635"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204637",
"url": "https://bugzilla.suse.com/1204637"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204780",
"url": "https://bugzilla.suse.com/1204780"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205700",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205711",
"url": "https://bugzilla.suse.com/1205711"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4037 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2153 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2978 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3176 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3521 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3535 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3625 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3707 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39189 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-23T09:43:37Z",
"generator": {
"date": "2022-12-23T09:43:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4614-1",
"initial_release_date": "2022-12-23T09:43:37Z",
"revision_history": [
{
"date": "2022-12-23T09:43:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.109.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.109.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.109.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.109.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.109.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.109.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.109.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.109.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.109.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.109.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.109.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.109.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.109.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.109.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.109.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.109.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.109.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4037"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4037",
"url": "https://www.suse.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2021-4037",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2022-2153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2153"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2153",
"url": "https://www.suse.com/security/cve/CVE-2022-2153"
},
{
"category": "external",
"summary": "SUSE Bug 1200788 for CVE-2022-2153",
"url": "https://bugzilla.suse.com/1200788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2978"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2978",
"url": "https://www.suse.com/security/cve/CVE-2022-2978"
},
{
"category": "external",
"summary": "SUSE Bug 1202700 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "external",
"summary": "SUSE Bug 1204745 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1204745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3176"
}
],
"notes": [
{
"category": "general",
"text": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn\u0027t handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3176",
"url": "https://www.suse.com/security/cve/CVE-2022-3176"
},
{
"category": "external",
"summary": "SUSE Bug 1203391 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "external",
"summary": "SUSE Bug 1203511 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-3176"
},
{
"cve": "CVE-2022-3521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3521"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3521",
"url": "https://www.suse.com/security/cve/CVE-2022-3521"
},
{
"category": "external",
"summary": "SUSE Bug 1204355 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3535"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3535",
"url": "https://www.suse.com/security/cve/CVE-2022-3535"
},
{
"category": "external",
"summary": "SUSE Bug 1204417 for CVE-2022-3535",
"url": "https://bugzilla.suse.com/1204417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "low"
}
],
"title": "CVE-2022-3535"
},
{
"cve": "CVE-2022-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3542",
"url": "https://www.suse.com/security/cve/CVE-2022-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1204402 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3594"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3594",
"url": "https://www.suse.com/security/cve/CVE-2022-3594"
},
{
"category": "external",
"summary": "SUSE Bug 1204479 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3625"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3625",
"url": "https://www.suse.com/security/cve/CVE-2022-3625"
},
{
"category": "external",
"summary": "SUSE Bug 1204637 for CVE-2022-3625",
"url": "https://bugzilla.suse.com/1204637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3629"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3629",
"url": "https://www.suse.com/security/cve/CVE-2022-3629"
},
{
"category": "external",
"summary": "SUSE Bug 1204635 for CVE-2022-3629",
"url": "https://bugzilla.suse.com/1204635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "low"
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3707"
}
],
"notes": [
{
"category": "general",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3707",
"url": "https://www.suse.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "SUSE Bug 1204780 for CVE-2022-3707",
"url": "https://bugzilla.suse.com/1204780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39189"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39189",
"url": "https://www.suse.com/security/cve/CVE-2022-39189"
},
{
"category": "external",
"summary": "SUSE Bug 1203066 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "external",
"summary": "SUSE Bug 1203067 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-40307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40307"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40307",
"url": "https://www.suse.com/security/cve/CVE-2022-40307"
},
{
"category": "external",
"summary": "SUSE Bug 1203322 for CVE-2022-40307",
"url": "https://bugzilla.suse.com/1203322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4129"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4129",
"url": "https://www.suse.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "SUSE Bug 1205711 for CVE-2022-4129",
"url": "https://bugzilla.suse.com/1205711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42703"
}
],
"notes": [
{
"category": "general",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42703",
"url": "https://www.suse.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "SUSE Bug 1204168 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "external",
"summary": "SUSE Bug 1204170 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "external",
"summary": "SUSE Bug 1206463 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1206463"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.109.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.109.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T09:43:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4559-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.14.21-150400_24_21 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3640: Fixed a use-after-free in l2cap_conn_del of the file net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4559,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4559",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4559-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4559-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224559-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4559-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4)",
"tracking": {
"current_release_date": "2022-12-19T12:06:19Z",
"generator": {
"date": "2022-12-19T12:06:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4559-1",
"initial_release_date": "2022-12-19T12:06:19Z",
"revision_history": [
{
"date": "2022-12-19T12:06:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4518-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.14.21-150400_24_18 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4518,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4518,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4519",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4518-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4518-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224518-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4518-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP4)",
"tracking": {
"current_release_date": "2022-12-16T22:34:11Z",
"generator": {
"date": "2022-12-16T22:34:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4518-1",
"initial_release_date": "2022-12-16T22:34:11Z",
"revision_history": [
{
"date": "2022-12-16T22:34:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4506-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150100_197_114 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4506,SUSE-SLE-Live-Patching-12-SP4-2022-4506,SUSE-SLE-Live-Patching-12-SP5-2022-4509,SUSE-SLE-Module-Live-Patching-15-2022-4507,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4508,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4511,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4512",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4506-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4506-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224506-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4506-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2022-12-16T17:05:42Z",
"generator": {
"date": "2022-12-16T17:05:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4506-1",
"initial_release_date": "2022-12-16T17:05:42Z",
"revision_history": [
{
"date": "2022-12-16T17:05:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4562-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-59_37 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4562,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4555,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4562,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4563,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4564,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4570,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4571",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4562-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4562-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224562-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4562-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-19T16:34:10Z",
"generator": {
"date": "2022-12-19T16:34:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4562-1",
"initial_release_date": "2022-12-19T16:34:10Z",
"revision_history": [
{
"date": "2022-12-19T16:34:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_43-preempt-17-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_43-preempt-17-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_43-preempt-17-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4517-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_98 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3640: Fixed a use-after-free in l2cap_conn_del of the file net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4517,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4517",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4517-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4517-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224517-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4517-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-16T21:06:32Z",
"generator": {
"date": "2022-12-16T21:06:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4517-1",
"initial_release_date": "2022-12-16T21:06:32Z",
"revision_history": [
{
"date": "2022-12-16T21:06:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_98-preempt-3-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_98-preempt-3-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_98-preempt-3-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:32Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:32Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:32Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-3-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:32Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4527-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150100_197_111 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4527,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4527",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4527-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4527-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224527-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4527-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2022-12-17T12:05:41Z",
"generator": {
"date": "2022-12-17T12:05:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4527-1",
"initial_release_date": "2022-12-17T12:05:41Z",
"revision_history": [
{
"date": "2022-12-17T12:05:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4574-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bsc#1203322).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-3545: Fixed a use-after-free vulnerability is area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).\n- CVE-2022-2153: Fixed a NULL pointer dereference in KVM when attempting to set a SynIC IRQ (bsc#1200788).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Drop error message when \u0027No request id available\u0027 (bsc#1204017).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Move __vmbus_open() (bsc#1204017).\n- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_netvsc: Add error handling while switching data path (bsc#1204850).\n- hv_netvsc: Add validation for untrusted Hyper-V values (bsc#1204017).\n- hv_netvsc: Cache the current data path to avoid duplicate call and message (bsc#1204017).\n- hv_netvsc: Check VF datapath when sending traffic to VF (bsc#1204017).\n- hv_netvsc: Fix error handling in netvsc_set_features() (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (bsc#1204017).\n- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).\n- hv_netvsc: Remove unnecessary round_up for recv_completion_cnt (bsc#1204017).\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (bsc#1204017).\n- hv_netvsc: Sync offloading features to VF NIC (git-fixes).\n- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).\n- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).\n- PCI: hv: Add validation for untrusted Hyper-V values (bsc#1204017).\n- PCI: hv: Drop msi_controller structure (bsc#1204446).\n- PCI: hv: Fix a race condition when removing the device (bsc#1204446).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (bsc#1199365).\n- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017, bsc#1203860, bsc#1205617).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017, bsc#1205617).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).\n- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).\n- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: hv: Support for create interrupt v3 (git-fixes).\n- PCI: hv: Use struct_size() helper (bsc#1204446).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- Revert \u0027scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()\u0027 (bsc#1204017).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).\n- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).\n- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).\n- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).\n- sunrpc: Re-purpose trace_svc_process (bsc#1205006).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- x86/hyperv: Set pv_info.name to \u0027Hyper-V\u0027 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4574,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4574,SUSE-SLE-Product-HA-15-SP1-2022-4574,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4574,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4574,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4574,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4574,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4574,SUSE-Storage-6-2022-4574,openSUSE-SLE-15.3-2022-4574,openSUSE-SLE-15.4-2022-4574",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4574-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4574-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224574-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4574-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html"
},
{
"category": "self",
"summary": "SUSE Bug 1198702",
"url": "https://bugzilla.suse.com/1198702"
},
{
"category": "self",
"summary": "SUSE Bug 1199365",
"url": "https://bugzilla.suse.com/1199365"
},
{
"category": "self",
"summary": "SUSE Bug 1200788",
"url": "https://bugzilla.suse.com/1200788"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1202686",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203183",
"url": "https://bugzilla.suse.com/1203183"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203322",
"url": "https://bugzilla.suse.com/1203322"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203860",
"url": "https://bugzilla.suse.com/1203860"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE Bug 1204170",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204355",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "self",
"summary": "SUSE Bug 1204402",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204415",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204432",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204446",
"url": "https://bugzilla.suse.com/1204446"
},
{
"category": "self",
"summary": "SUSE Bug 1204479",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204635",
"url": "https://bugzilla.suse.com/1204635"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1205006",
"url": "https://bugzilla.suse.com/1205006"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1206113",
"url": "https://bugzilla.suse.com/1206113"
},
{
"category": "self",
"summary": "SUSE Bug 1206114",
"url": "https://bugzilla.suse.com/1206114"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4037 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2153 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3521 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42328 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42329 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-19T16:57:55Z",
"generator": {
"date": "2022-12-19T16:57:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4574-1",
"initial_release_date": "2022-12-19T16:57:55Z",
"revision_history": [
{
"date": "2022-12-19T16:57:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-default-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-syms-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150100.197.131.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150100.197.131.1.noarch",
"product_id": "kernel-devel-4.12.14-150100.197.131.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150100.197.131.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150100.197.131.1.noarch",
"product_id": "kernel-docs-4.12.14-150100.197.131.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150100.197.131.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150100.197.131.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150100.197.131.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150100.197.131.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150100.197.131.1.noarch",
"product_id": "kernel-macros-4.12.14-150100.197.131.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150100.197.131.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150100.197.131.1.noarch",
"product_id": "kernel-source-4.12.14-150100.197.131.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150100.197.131.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150100.197.131.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150100.197.131.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-default-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-default-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-default-base-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-default-man-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-syms-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.131.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-debug-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-default-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-syms-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.131.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.131.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.131.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.131.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.131.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.131.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.131.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.131.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4037"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4037",
"url": "https://www.suse.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2021-4037",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2022-2153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2153"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2153",
"url": "https://www.suse.com/security/cve/CVE-2022-2153"
},
{
"category": "external",
"summary": "SUSE Bug 1200788 for CVE-2022-2153",
"url": "https://bugzilla.suse.com/1200788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-3521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3521"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3521",
"url": "https://www.suse.com/security/cve/CVE-2022-3521"
},
{
"category": "external",
"summary": "SUSE Bug 1204355 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3542",
"url": "https://www.suse.com/security/cve/CVE-2022-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1204402 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3594"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3594",
"url": "https://www.suse.com/security/cve/CVE-2022-3594"
},
{
"category": "external",
"summary": "SUSE Bug 1204479 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3629"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3629",
"url": "https://www.suse.com/security/cve/CVE-2022-3629"
},
{
"category": "external",
"summary": "SUSE Bug 1204635 for CVE-2022-3629",
"url": "https://bugzilla.suse.com/1204635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "low"
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3643"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3643",
"url": "https://www.suse.com/security/cve/CVE-2022-3643"
},
{
"category": "external",
"summary": "SUSE Bug 1206113 for CVE-2022-3643",
"url": "https://bugzilla.suse.com/1206113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-40307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40307"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40307",
"url": "https://www.suse.com/security/cve/CVE-2022-40307"
},
{
"category": "external",
"summary": "SUSE Bug 1203322 for CVE-2022-40307",
"url": "https://bugzilla.suse.com/1203322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42328"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42328",
"url": "https://www.suse.com/security/cve/CVE-2022-42328"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42328",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42329"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42329",
"url": "https://www.suse.com/security/cve/CVE-2022-42329"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42329",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42703"
}
],
"notes": [
{
"category": "general",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42703",
"url": "https://www.suse.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "SUSE Bug 1204168 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "external",
"summary": "SUSE Bug 1204170 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "external",
"summary": "SUSE Bug 1206463 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1206463"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "important"
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-1-150100.3.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.131.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.131.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.131.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:57:55Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4546-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP5)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-122_136 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4546,SUSE-SLE-Live-Patching-12-SP5-2022-4546",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4546-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4546-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224546-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4546-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP5)",
"tracking": {
"current_release_date": "2022-12-18T00:05:43Z",
"generator": {
"date": "2022-12-18T00:05:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4546-1",
"initial_release_date": "2022-12-18T00:05:43Z",
"revision_history": [
{
"date": "2022-12-18T00:05:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_136-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_136-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:43Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:43Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:43Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4569-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.14.21-150400_22 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4569,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4556,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4569,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4565",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4569-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4569-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224569-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4569-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)",
"tracking": {
"current_release_date": "2022-12-19T12:34:59Z",
"generator": {
"date": "2022-12-19T12:34:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4569-1",
"initial_release_date": "2022-12-19T12:34:59Z",
"revision_history": [
{
"date": "2022-12-19T12:34:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_68-preempt-10-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_68-preempt-10-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_68-preempt-10-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4551-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_76 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4551,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4551",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4551-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4551-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224551-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4551-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-19T11:08:09Z",
"generator": {
"date": "2022-12-19T11:08:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4551-1",
"initial_release_date": "2022-12-19T11:08:09Z",
"revision_history": [
{
"date": "2022-12-19T11:08:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_76-preempt-8-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_76-preempt-8-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_76-preempt-8-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2023:2163-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2483: Fixed a use after free bug in emac_remove due caused by a race condition (bsc#1211037).\n- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).\n- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).\n- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).\n- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).\n- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).\n\nThe following non-security bugs were fixed:\n\n- ARM: 8702/1: head-common.S: Clear lr before jumping to start_kernel() (git-fixes)\n- USB: dwc3: fix runtime pm imbalance on probe errors (git-fixes).\n- USB: dwc3: fix runtime pm imbalance on unbind (git-fixes).\n- arm64: kaslr: Reserve size of ARM64_MEMSTART_ALIGN in linear region (git-fixes)\n- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath10k: Fix the parsing error in service available event (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).\n- audit: improve audit queue handling when \u0027audit=1\u0027 on cmdline (bsc#1209969).\n- bpf, x86: Fix encoding for lower 8-bit registers in BPF_STX BPF_B (git-fixes).\n- bs-upload-kernel: Do not skip post-build-checks\n- cachefiles: Drop superfluous readpages aops NULL check (bsc#1210430).\n- cachefiles: Fix page leak in cachefiles_read_backing_file while vmscan is active (bsc#1210430).\n- cachefiles: Fix race between read_waiter and read_copier involving op-\u003eto_do (bsc#1210430).\n- cachefiles: Handle readpage error correctly (bsc#1210430).\n- cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827).\n- cifs: fix negotiate context parsing (bsc#1210301).\n- cifs: fix open leaks in open_cached_dir() (bsc#1209342).\n- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).\n- crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).\n- drivers: net: lmc: fix case value for target abort error (git-fixes).\n- fscache, cachefiles: remove redundant variable \u0027cache\u0027 (bsc#1210430).\n- ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).\n- intel_pmc_ipc: restore ability to call functions with irq enabled (git-fixes).\n- ipmi: fix SSIF not responding under certain cond (git-fixes).\n- iwlwifi: Fix -EIO error code that is never returned (git-fixes).\n- iwlwifi: fw: make pos static in iwl_sar_get_ewrd_table() loop (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).\n- kabi/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777).\n- kcm: Only allow TCP sockets to be attached to a KCM mux (git-fixes).\n- keys: Change keyring_serialise_link_sem to a mutex (bsc#1207088).\n- keys: Fix linking a duplicate key to a keyring\u0027s assoc_array (bsc#1207088).\n- keys: Hoist locking out of __key_link_begin() (bsc#1207088).\n- kretprobe: Prevent triggering kretprobe from within kprobe_flush_task (git-fixes).\n- l2tp: clean up stale tunnel or session in pppol2tp_connect\u0027s error path (git-fixes).\n- l2tp: fix pseudo-wire type for sessions created by pppol2tp_connect() (git-fixes).\n- l2tp: reject creation of non-PPP sessions on L2TPv2 tunnels (git-fixes).\n- net/ncsi: Do not return error on normal response (git-fixes).\n- net: axienet: Fix double deregister of mdio (git-fixes).\n- net: core: dst: Add kernel-doc for \u0027net\u0027 parameter (git-fixes).\n- net: core: dst_cache_set_ip6: Rename \u0027addr\u0027 parameter to \u0027saddr\u0027 for consistency (git-fixes).\n- net: phy: realtek: Use the dummy stubs for MMD register access for rtl8211b (git-fixes).\n- net: prevent ISA drivers from building on PPC32 (git-fixes).\n- net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).\n- netfilter: nft_set_rbtree: fix parameter of __nft_rbtree_lookup() (git-fixes).\n- netfilter: x_tables: Add note about how to free percpu counters (git-fixes).\n- ntp: Limit TAI-UTC offset (git-fixes)\n- nvme-pci: do not WARN_ON in nvme_reset_work if ctrl.state is not RESETTING (git-fixes).\n- nvme-pci: fix doorbell buffer value endianness (git-fixes).\n- nvme: retain split access workaround for capability reads (git-fixes).\n- platform/x86: intel_pmc_ipc: Use devm_* calls in driver probe function (git-fixes).\n- platform/x86: intel_pmc_ipc: Use spin_lock to protect GCR updates (git-fixes).\n- powercap: fix possible name leak in powercap_register_zone() (git-fixes).\n- powerpc/numa: Consider the max NUMA node for migratable LPAR (bsc#1209999 ltc#202140 bsc#1190544 ltc#194520 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/numa: Detect support for coregroup (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/numa: Limit possible nodes to within num_possible_nodes (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/numa: Restrict possible nodes based on platform (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).\n- printk: Give error on attempt to set log buffer length to over 2G (bsc#1210534).\n- ring-buffer: Fix race while reader and writer are on the same page (git-fixes).\n- s390/percpu: add READ_ONCE() to arch_this_cpu_to_op_simple() (git-fixes).\n- scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).\n- scsi: qla2xxx: Perform lockless command completion in abort path (git-fixes).\n- sctp: do not free asoc when it is already dead in sctp_sendmsg (git-fixes).\n- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (git-fixes).\n- sctp: use the right sk after waking up from wait_buf sleep (git-fixes).\n- struct ci_hdrc: hide new member at end (git-fixes).\n- struct wmi_svc_avail_ev_arg: new member to end (git-fixes).\n- timekeeping: Prevent 32bit truncation in (git-fixes)\n- tuntap: fix dividing by zero in ebpf queue selection (git-fixes).\n- uprobes/x86: Fix detection of 32-bit user mode (git-fixes).\n- usb/ohci-platform: Fix a warning when hibernating (git-fixes).\n- usb: chipidea: core: fix possible concurrent when switch role (git-fixes).\n- usb: chipidea: fix missing goto in `ci_hdrc_probe` (git-fixes).\n- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).\n- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).\n- usb: host: ohci-pxa27x: Fix and \u0026 vs | typo (git-fixes).\n- usb: storage: Add check for kcalloc (git-fixes).\n- usb: typec: Check for ops-\u003eexit instead of ops-\u003eenter in altmode_exit (git-fixes).\n- watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).\n- wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git-fixes).\n- workqueue: Fix missing kfree(rescuer) in destroy_workqueue() (bsc#1210460).\n- workqueue: Fix spurious sanity check failures in destroy_workqueue() (bsc#1210460).\n- wq: handle VM suspension in stall detection (bsc#1210466).\n- x86, boot: Remove multiple copy of static function sanitize_boot_params() (git-fixes).\n- x86/apic: Fix arch_dynirq_lower_bound() bug for DT enabled machines (git-fixes).\n- x86/apic: Handle missing global clockevent gracefully (git-fixes bsc#1142926).\n- x86/apic: Soft disable APIC before initializing it (git-fixes).\n- x86/boot/compressed: Disable relocation relaxation (git-fixes).\n- x86/boot: Avoid using Intel mnemonics in AT\u0026T syntax asm (git-fixes).\n- x86/bugs: Add Cannon lake to RETBleed affected CPU list (git-fixes).\n- x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).\n- x86/decoder: Add TEST opcode to Group3-2 (git-fixes).\n- x86/fpu: Prevent FPU state corruption (git-fixes).\n- x86/ioapic: Prevent inconsistent state when moving an interrupt (git-fixes).\n- x86/irq: Ensure PI wakeup handler is unregistered before module unload (git-fixes).\n- x86/kprobes: Fix to check non boostable prefixes correctly (git-fixes).\n- x86/kprobes: Restore BTF if the single-stepping is cancelled (git-fixes).\n- x86/lib/cpu: Address missing prototypes warning (git-fixes).\n- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).\n- x86/mce: Lower throttling MCE messages\u0027 priority to warning (git-fixes).\n- x86/mm: Stop printing BRK addresses (git-fixes).\n- x86/mm: Use the correct function type for native_set_fixmap() (git-fixes).\n- x86/pkeys: Add check for pkey \u0027overflow\u0027 (git-fixes).\n- x86/reboot: Always use NMI fallback when shutdown via reboot vector IPI fails (git-fixes).\n- x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inline (git-fixes).\n- x86/sysfb: Fix check for bad VRAM size (git-fixes).\n- x86/tools/relocs: Fix non-POSIX regexp (git-fixes).\n- x86/tools: Fix objdump version check again (git-fixes).\n- x86/virt: Eat faults on VMXOFF in reboot flows (git-fixes).\n- x86/virt: Mark flags and memory as clobbered by VMXOFF (git-fixes).\n- x86: Do not let pgprot_modify() change the page encryption bit (git-fixes).\n- x86_64: Fix jiffies ODR violation (git-fixes).\n- xfrm: policy: use hlist rcu variants on insert (git-fixes).\n- xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git-fixes).\n- xhci: hide include of iommu.h (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-2163,SUSE-SLE-HA-12-SP5-2023-2163,SUSE-SLE-Live-Patching-12-SP5-2023-2163,SUSE-SLE-SDK-12-SP5-2023-2163,SUSE-SLE-SERVER-12-SP5-2023-2163,SUSE-SLE-WE-12-SP5-2023-2163",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2163-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:2163-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232163-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:2163-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html"
},
{
"category": "self",
"summary": "SUSE Bug 1142685",
"url": "https://bugzilla.suse.com/1142685"
},
{
"category": "self",
"summary": "SUSE Bug 1142926",
"url": "https://bugzilla.suse.com/1142926"
},
{
"category": "self",
"summary": "SUSE Bug 1174777",
"url": "https://bugzilla.suse.com/1174777"
},
{
"category": "self",
"summary": "SUSE Bug 1190544",
"url": "https://bugzilla.suse.com/1190544"
},
{
"category": "self",
"summary": "SUSE Bug 1202353",
"url": "https://bugzilla.suse.com/1202353"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1207088",
"url": "https://bugzilla.suse.com/1207088"
},
{
"category": "self",
"summary": "SUSE Bug 1209342",
"url": "https://bugzilla.suse.com/1209342"
},
{
"category": "self",
"summary": "SUSE Bug 1209687",
"url": "https://bugzilla.suse.com/1209687"
},
{
"category": "self",
"summary": "SUSE Bug 1209777",
"url": "https://bugzilla.suse.com/1209777"
},
{
"category": "self",
"summary": "SUSE Bug 1209871",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "self",
"summary": "SUSE Bug 1209887",
"url": "https://bugzilla.suse.com/1209887"
},
{
"category": "self",
"summary": "SUSE Bug 1209969",
"url": "https://bugzilla.suse.com/1209969"
},
{
"category": "self",
"summary": "SUSE Bug 1209999",
"url": "https://bugzilla.suse.com/1209999"
},
{
"category": "self",
"summary": "SUSE Bug 1210202",
"url": "https://bugzilla.suse.com/1210202"
},
{
"category": "self",
"summary": "SUSE Bug 1210301",
"url": "https://bugzilla.suse.com/1210301"
},
{
"category": "self",
"summary": "SUSE Bug 1210329",
"url": "https://bugzilla.suse.com/1210329"
},
{
"category": "self",
"summary": "SUSE Bug 1210336",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "self",
"summary": "SUSE Bug 1210337",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "self",
"summary": "SUSE Bug 1210430",
"url": "https://bugzilla.suse.com/1210430"
},
{
"category": "self",
"summary": "SUSE Bug 1210460",
"url": "https://bugzilla.suse.com/1210460"
},
{
"category": "self",
"summary": "SUSE Bug 1210466",
"url": "https://bugzilla.suse.com/1210466"
},
{
"category": "self",
"summary": "SUSE Bug 1210469",
"url": "https://bugzilla.suse.com/1210469"
},
{
"category": "self",
"summary": "SUSE Bug 1210498",
"url": "https://bugzilla.suse.com/1210498"
},
{
"category": "self",
"summary": "SUSE Bug 1210506",
"url": "https://bugzilla.suse.com/1210506"
},
{
"category": "self",
"summary": "SUSE Bug 1210534",
"url": "https://bugzilla.suse.com/1210534"
},
{
"category": "self",
"summary": "SUSE Bug 1210647",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "self",
"summary": "SUSE Bug 1210827",
"url": "https://bugzilla.suse.com/1210827"
},
{
"category": "self",
"summary": "SUSE Bug 1211037",
"url": "https://bugzilla.suse.com/1211037"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36691 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1611 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1670 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1855 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1989 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1990 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1998 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2162 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2483 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-30772 page",
"url": "https://www.suse.com/security/cve/CVE-2023-30772/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-05-10T17:34:44Z",
"generator": {
"date": "2023-05-10T17:34:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:2163-1",
"initial_release_date": "2023-05-10T17:34:44Z",
"revision_history": [
{
"date": "2023-05-10T17:34:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.159.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.159.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.159.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.159.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.159.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.159.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.159.1.aarch64",
"product_id": "kernel-default-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.159.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.159.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.159.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.159.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.159.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.159.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.159.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.159.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.159.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.159.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.159.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.159.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.159.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.159.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.159.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.159.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.159.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.159.1.noarch",
"product_id": "kernel-devel-4.12.14-122.159.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.159.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.159.1.noarch",
"product_id": "kernel-docs-4.12.14-122.159.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.159.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.159.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.159.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.159.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.159.1.noarch",
"product_id": "kernel-macros-4.12.14-122.159.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.159.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.159.1.noarch",
"product_id": "kernel-source-4.12.14-122.159.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.159.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.159.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.159.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.159.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.159.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.159.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.159.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.159.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.159.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.159.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.159.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.159.1.s390x",
"product_id": "kernel-default-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.159.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.159.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.159.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.159.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.159.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.159.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.159.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.159.1.s390x",
"product_id": "kernel-syms-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.159.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.159.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.159.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.159.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.159.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.159.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.159.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.159.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.159.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.159.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.159.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.159.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.159.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.159.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.159.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.159.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.159.1.x86_64",
"product_id": "kernel-default-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.159.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.159.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.159.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.159.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.159.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.159.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.159.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.159.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.159.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.159.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.159.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.159.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.159.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.159.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.159.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.159.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.159.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.159.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.159.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.159.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.159.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.159.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.159.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.159.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.159.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.159.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.159.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.159.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.159.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.159.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.159.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.159.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.159.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.159.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.159.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.159.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.159.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.159.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.159.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.159.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.159.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.159.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.159.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.159.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.159.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.159.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.159.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.159.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.159.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.159.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.159.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.159.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.159.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36691"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36691",
"url": "https://www.suse.com/security/cve/CVE-2020-36691"
},
{
"category": "external",
"summary": "SUSE Bug 1209613 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209613"
},
{
"category": "external",
"summary": "SUSE Bug 1209777 for CVE-2020-36691",
"url": "https://bugzilla.suse.com/1209777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2023-1611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1611"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1611",
"url": "https://www.suse.com/security/cve/CVE-2023-1611"
},
{
"category": "external",
"summary": "SUSE Bug 1209687 for CVE-2023-1611",
"url": "https://bugzilla.suse.com/1209687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1670"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1670",
"url": "https://www.suse.com/security/cve/CVE-2023-1670"
},
{
"category": "external",
"summary": "SUSE Bug 1209871 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1209871"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-1670",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1855"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1855",
"url": "https://www.suse.com/security/cve/CVE-2023-1855"
},
{
"category": "external",
"summary": "SUSE Bug 1210202 for CVE-2023-1855",
"url": "https://bugzilla.suse.com/1210202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1989"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1989",
"url": "https://www.suse.com/security/cve/CVE-2023-1989"
},
{
"category": "external",
"summary": "SUSE Bug 1210336 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210336"
},
{
"category": "external",
"summary": "SUSE Bug 1210500 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1210500"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1989",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "important"
}
],
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1990"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1990",
"url": "https://www.suse.com/security/cve/CVE-2023-1990"
},
{
"category": "external",
"summary": "SUSE Bug 1210337 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210337"
},
{
"category": "external",
"summary": "SUSE Bug 1210501 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1210501"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-1990",
"url": "https://bugzilla.suse.com/1214128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1998"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1998",
"url": "https://www.suse.com/security/cve/CVE-2023-1998"
},
{
"category": "external",
"summary": "SUSE Bug 1210506 for CVE-2023-1998",
"url": "https://bugzilla.suse.com/1210506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2124"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2124",
"url": "https://www.suse.com/security/cve/CVE-2023-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1210498 for CVE-2023-2124",
"url": "https://bugzilla.suse.com/1210498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2162"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2162",
"url": "https://www.suse.com/security/cve/CVE-2023-2162"
},
{
"category": "external",
"summary": "SUSE Bug 1210647 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210647"
},
{
"category": "external",
"summary": "SUSE Bug 1210662 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1210662"
},
{
"category": "external",
"summary": "SUSE Bug 1213841 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213841"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-2162",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2483"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2483",
"url": "https://www.suse.com/security/cve/CVE-2023-2483"
},
{
"category": "external",
"summary": "SUSE Bug 1211037 for CVE-2023-2483",
"url": "https://bugzilla.suse.com/1211037"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-30772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-30772"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-30772",
"url": "https://www.suse.com/security/cve/CVE-2023-30772"
},
{
"category": "external",
"summary": "SUSE Bug 1210329 for CVE-2023-30772",
"url": "https://bugzilla.suse.com/1210329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_159-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.159.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.159.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-05-10T17:34:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-30772"
}
]
}
suse-su-2022:4572-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_101 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4572,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4572",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4572-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4572-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224572-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4572-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-19T16:34:20Z",
"generator": {
"date": "2022-12-19T16:34:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4572-1",
"initial_release_date": "2022-12-19T16:34:20Z",
"revision_history": [
{
"date": "2022-12-19T16:34:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_101-preempt-2-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_101-preempt-2-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_101-preempt-2-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:20Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_101-default-2-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:20Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
suse-su-2022:4505-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bnc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bnc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bnc#1206113).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Drop error message when \u0027No request id available\u0027 (bsc#1204017).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017, bsc#1205617).\n- Drivers: hv: vmbus: Move __vmbus_open() (bsc#1204017).\n- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- FDDI: defxx: Bail out gracefully with unassigned PCI resource for CSR (git-fixes).\n- FDDI: defxx: Make MMIO the configuration default except for EISA (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes).\n- KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).\n- KVM: s390: Fix handle_sske page fault handling (git-fixes).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes).\n- KVM: s390: fix memory slot handling for KVM_SET_USER_MEMORY_REGION (git-fixes).\n- KVM: s390: reduce number of IO pins to 1 (git-fixes).\n- KVM: s390: split kvm_s390_logical_to_effective (git-fixes).\n- KVM: s390: split kvm_s390_real_to_abs (git-fixes).\n- KVM: s390x: fix SCK locking (git-fixes).\n- NIU: fix incorrect error return, missed in previous revert (git-fixes).\n- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).\n- PCI: hv: Add validation for untrusted Hyper-V values (bsc#1204017).\n- PCI: hv: Drop msi_controller structure (bsc#1204446).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (bsc#1199365).\n- PCI: hv: Fix a race condition when removing the device (bsc#1204446).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017, bsc#1203860, bsc#1205617).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017, bsc#1205617).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).\n- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).\n- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: hv: Support for create interrupt v3 (git-fixes).\n- PCI: hv: Use struct_size() helper (bsc#1204446).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- PM: hibernate: fix sparse warnings (git-fixes).\n- Xen/gntdev: do not ignore kernel unmapping error (git-fixes).\n- add missing bug reference to a hv_netvsc patch file (bsc#1204850).\n- always clear the X2APIC_ENABLE bit for PV guest (git-fixes).\n- arm/xen: Do not probe xenbus as part of an early initcall (git-fixes).\n- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).\n- bfq: Update cgroup information before merging bio (git-fixes).\n- blk-mq: add callback of .cleanup_rq (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block/bfq: fix ifdef for CONFIG_BFQ_GROUP_IOSCHED=y (git-fixes).\n- block: Add a helper to validate the block size (git-fixes).\n- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).\n- block: do not delete queue kobject before its children (git-fixes).\n- block: respect queue limit of max discard segment (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- block: use \u0027unsigned long\u0027 for blk_validate_block_size() (git-fixes).\n- bnxt_en: Clean up completion ring page arrays completely (git-fixes).\n- bnxt_en: Do not use static arrays for completion ring pages (git-fixes).\n- bnxt_en: Fix Priority Bytes and Packets counters in ethtool -S (git-fixes).\n- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).\n- bnxt_en: Free context memory after disabling PCI in probe error path (git-fixes).\n- bnxt_en: Increase maximum RX ring size if jumbo ring is not used (git-fixes).\n- brd: re-enable __GFP_HIGHMEM in brd_insert_page() (git-fixes).\n- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).\n- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).\n- can: rcar_can: fix suspend/resume (git-fixes).\n- ceph: check availability of mds cluster on mount after wait timeout (bsc#1205903).\n- ceph: do not skip updating wanted caps when cap is stale (bsc#1205905).\n- ceph: fix fscache invalidation (bsc#1205907).\n- ceph: fix potential race in ceph_check_caps (bsc#1205906).\n- ceph: lockdep annotations for try_nonblocking_invalidate (bsc#1205908).\n- ceph: return -EINVAL if given fsc mount option on kernel w/o support (bsc#1205902).\n- ceph: return -ERANGE if virtual xattr value didn\u0027t fit in buffer (bsc#1205901).\n- ceph: return ceph_mdsc_do_request() errors from __get_parent() (bsc#1205904).\n- cuse: prevent clone (bsc#1206120).\n- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm mpath: remove harmful bio-based optimization (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm raid: fix address sanitizer warning in raid_resume (git-fixes).\n- dm raid: fix address sanitizer warning in raid_status (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- e100: fix buffer overrun in e100_get_regs (git-fixes).\n- e100: fix length calculation in e100_get_regs_len (git-fixes).\n- floppy: Fix hang in watchdog when disk is ejected (git-fixes).\n- ftrace: Fix char print issue in print_ip_ins() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- fuse: do not check refcount after stealing page (bsc#1206119).\n- fuse: retrieve: cap requested size to negotiated max_write (bsc#1206118).\n- fuse: use READ_ONCE on congestion_threshold and max_background (bsc#1206117).\n- gianfar: Disable EEE autoneg by default (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_netvsc: Add error handling while switching data path (bsc#1204850).\n- hv_netvsc: Add validation for untrusted Hyper-V values (bsc#1204017).\n- hv_netvsc: Cache the current data path to avoid duplicate call and message (bsc#1204017).\n- hv_netvsc: Check VF datapath when sending traffic to VF (bsc#1204017).\n- hv_netvsc: Fix error handling in netvsc_set_features() (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (git-fixes).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (bsc#1204017).\n- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).\n- hv_netvsc: Remove unnecessary round_up for recv_completion_cnt (bsc#1204017).\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (bsc#1204017).\n- hv_netvsc: Sync offloading features to VF NIC (git-fixes).\n- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).\n- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).\n- i40e: Fix kernel crash during module removal (git-fixes).\n- i40e: Fix reset path while removing the driver (git-fixes).\n- i40e: fix endless loop under rtnl (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- kABI: Fix after adding trace_iterator.wait_index (git-fixes).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- kprobes/x86/xen: blacklist non-attachable xen interrupt functions (git-fixes).\n- macsec: check return value of skb_to_sgvec always (git-fixes).\n- macsec: fix memory leaks when skb_to_sgvec fails (git-fixes).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).\n- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mceusb: RX -EPIPE (urb status = -32) lockup failure fix (git-fixes).\n- media: mceusb: TX -EPIPE (urb status = -32) lockup fix (git-fixes).\n- media: mceusb: do not read data parameters unless required (git-fixes).\n- media: mceusb: fix inaccurate debug buffer dumps, and misleading debug messages (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: mceusb: sporadic RX truncation corruption fix (git-fixes).\n- mm, swap, frontswap: fix THP swap if frontswap enabled (git-fixes).\n- module: change to print useful messages from elf_validity_check() (git-fixes).\n- module: fix [e_shstrndx].sh_size=0 OOB access (git-fixes).\n- module: harden ELF info handling (git-fixes).\n- natsemi: sonic: stop calling netdev_boot_setup_check (git-fixes).\n- nbd: do not update block size after device is started (git-fixes).\n- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).\n- net/mlx5: Fix flow table chaining (git-fixes).\n- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).\n- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).\n- net: aquantia: Fix actual speed capabilities reporting (git-fixes).\n- net: bcmgenet: Ensure all TX/RX queues DMAs are disabled (git-fixes).\n- net: ethernet: arc: fix error handling in emac_rockchip_probe (git-fixes).\n- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).\n- net: ethernet: xilinx: Mark XILINX_LL_TEMAC broken on 64-bit (git-fixes).\n- net: hns3: add limit ets dwrr bandwidth cannot be 0 (git-fixes).\n- net: hns3: check vlan id before using it (git-fixes).\n- net: hns3: disable sriov before unload hclge layer (git-fixes).\n- net: hns3: do not allow call hns3_nic_net_open repeatedly (git-fixes).\n- net: hns3: fix change RSS \u0027hfunc\u0027 ineffective issue (git-fixes).\n- net: hns3: fix kernel crash when unload VF while it is being reset (git-fixes).\n- net: hns3: reset DWRR of unused tc to zero (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: ieee802154: adf7242: Fix bug if defined DEBUG (git-fixes).\n- net: ieee802154: at86rf230: Stop leaking skb\u0027s (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: mdiobus: Fix memory leak in __mdiobus_register (git-fixes).\n- net: moxa: fix UAF in moxart_mac_probe (git-fixes).\n- net: natsemi: Fix missing pci_disable_device() in probe and remove (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- net: nxp: lpc_eth.c: avoid hang when bringing interface down (git-fixes).\n- net: qcom/emac: fix UAF in emac_remove (git-fixes).\n- net: smsc911x: Fix unload crash when link is up (git-fixes).\n- net: ti: fix UAF in tlan_remove_one (git-fixes).\n- net: xen-netback: fix return type of ndo_start_xmit function (git-fixes).\n- nfsd: set the server_scope during service startup (bsc#1203746).\n- null_blk: Fix the null_add_dev() error path (git-fixes).\n- null_blk: fix ida error handling in null_add_dev() (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- phy: mdio: fix memory leak (git-fixes).\n- ptp: dp83640: do not define PAGE0 (git-fixes).\n- qed: Fix missing error code in qed_slowpath_start() (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Allow splice to read previous partially read pages (git-fixes).\n- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).\n- ring-buffer: Fix race between reset page and reading page (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- s390/cio: Fix the \u0027type\u0027 field in s390_cio_tpi tracepoint (git-fixes).\n- s390/cio: dont call css_wait_for_slow_path() inside a lock (git-fixes).\n- s390/cpcmd: fix inline assembly register clobbering (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).\n- s390/ctcm: fix potential memory leak (git-fixes).\n- s390/ctcm: fix variable dereferenced before check (git-fixes).\n- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (git-fixes).\n- s390/lcs: fix variable dereferenced before check (git-fixes).\n- s390/mcck: fix invalid KVM guest condition check (git-fixes).\n- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/module: fix loading modules with a lot of relocations (git-fixes).\n- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).\n- s390/nmi: handle vector validity failures for KVM guests (git-fixes).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (git-fixes).\n- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).\n- s390/pv: fix the forcing of the swiotlb (git-fixes).\n- s390/qdio: cancel the ESTABLISH ccw after timeout (git-fixes).\n- s390/qdio: fix roll-back after timeout on ESTABLISH ccw (git-fixes).\n- s390/qeth: Fix deadlock in remove_discipline (bsc#1206213 LTC#200742).\n- s390/qeth: Fix error handling during VNICC initialization (git-fixes).\n- s390/qeth: Fix initialization of vnicc cmd masks during set online (git-fixes).\n- s390/qeth: Fix vnicc_is_in_use if rx_bcast not set (git-fixes).\n- s390/qeth: do not defer close_dev work during recovery (bsc#1206213 LTC#200742).\n- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).\n- s390/qeth: fix deadlock during failing recovery (bsc#1206213 LTC#200742).\n- s390/qeth: fix false reporting of VNIC CHAR config failure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: remove driver-wide workqueue (bsc#1206213 LTC#200742).\n- s390/qeth: vnicc Fix EOPNOTSUPP precedence (git-fixes).\n- s390/qeth: vnicc Fix init to default (git-fixes).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (git-fixes).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- s390: Remove arch_has_random, arch_has_random_seed (git-fixes).\n- s390: appldata depends on PROC_SYSCTL (git-fixes).\n- s390: define get_cycles macro for arch-override (git-fixes).\n- s390: fix nospec table alignments (git-fixes).\n- sbitmap: fix possible io hung due to lost wakeup (git-fixes).\n- scsi: bsg: Remove support for SCSI_IOCTL_SEND_COMMAND (git-fixes).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (git-fixes).\n- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).\n- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).\n- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).\n- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).\n- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).\n- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).\n- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- sfp: fix RX_LOS signal handling (git-fixes).\n- sis900: Fix missing pci_disable_device() in probe and remove (git-fixes).\n- sunrpc: Re-purpose trace_svc_process (bsc#1205006).\n- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).\n- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).\n- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).\n- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).\n- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).\n- tracing: Wake up waiters when tracing is disabled (git-fixes).\n- tulip: windbond-840: Fix missing pci_disable_device() in probe and remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio: ccw: fix error return in vfio_ccw_sch_event (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- virtio/s390: implement virtio-ccw revision 2 correctly (git-fixes).\n- virtio_blk: eliminate anonymous module_init \u0026 module_exit (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/hyperv: Output host build info as normal Windows version number (git-fixes).\n- x86/hyperv: Set pv_info.name to \u0027Hyper-V\u0027 (git-fixes).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/xen: Distribute switch variables for initialization (git-fixes).\n- x86/xen: Return from panic notifier (git-fixes).\n- x86/xen: do not unbind uninitialized lock_kicker_irq (git-fixes).\n- xen-blkback: prevent premature module unload (git-fixes).\n- xen-netback: correct success/error reporting for the SKB-with-fraglist case (git-fixes).\n- xen-netfront: remove warning when unloading module (git-fixes).\n- xen/balloon: fix balloon initialization for PVH Dom0 (git-fixes).\n- xen/balloon: fix balloon kthread freezing (git-fixes).\n- xen/balloon: fix ballooned page accounting without hotplug enabled (git-fixes).\n- xen/balloon: fix cancelled balloon action (git-fixes).\n- xen/balloon: use a kernel thread instead a workqueue (git-fixes).\n- xen/blkback: fix memory leaks (git-fixes).\n- xen/efi: Set nonblocking callbacks (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Fix off-by-one error when unmapping with holes (git-fixes).\n- xen/gntdev: Fix partial gntdev_mmap() cleanup (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/gntdev: Prevent leaking grants (git-fixes).\n- xen/grant-table: Use put_page instead of free_page (git-fixes).\n- xen/pciback: Check dev_data before using it (git-fixes).\n- xen/pciback: remove set but not used variable \u0027old_state\u0027 (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen/scsiback: add error handling for xenbus_printf (git-fixes).\n- xen/xenbus: Fix granting of vmalloc\u0027d memory (git-fixes).\n- xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status (git-fixes).\n- xen: Fix XenStore initialisation for XS_LOCAL (git-fixes).\n- xen: Fix event channel callback via INTX/GSI (git-fixes).\n- xen: XEN_ACPI_PROCESSOR is Dom0-only (git-fixes).\n- xen: add error handling for xenbus_printf (git-fixes).\n- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).\n- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (git-fixes).\n- xen: xenbus: use put_device() instead of kfree() (git-fixes).\n- xenbus: req-\u003ebody should be updated before req-\u003estate (git-fixes).\n- xenbus: req-\u003eerr should be updated before req-\u003estate (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4505,SUSE-SLE-SERVER-12-SP5-2022-4505",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4505-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4505-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224505-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4505-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1106594",
"url": "https://bugzilla.suse.com/1106594"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164051",
"url": "https://bugzilla.suse.com/1164051"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1199365",
"url": "https://bugzilla.suse.com/1199365"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1203183",
"url": "https://bugzilla.suse.com/1203183"
},
{
"category": "self",
"summary": "SUSE Bug 1203746",
"url": "https://bugzilla.suse.com/1203746"
},
{
"category": "self",
"summary": "SUSE Bug 1203860",
"url": "https://bugzilla.suse.com/1203860"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204142",
"url": "https://bugzilla.suse.com/1204142"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204446",
"url": "https://bugzilla.suse.com/1204446"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204810",
"url": "https://bugzilla.suse.com/1204810"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1204963",
"url": "https://bugzilla.suse.com/1204963"
},
{
"category": "self",
"summary": "SUSE Bug 1205006",
"url": "https://bugzilla.suse.com/1205006"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205234",
"url": "https://bugzilla.suse.com/1205234"
},
{
"category": "self",
"summary": "SUSE Bug 1205264",
"url": "https://bugzilla.suse.com/1205264"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1205901",
"url": "https://bugzilla.suse.com/1205901"
},
{
"category": "self",
"summary": "SUSE Bug 1205902",
"url": "https://bugzilla.suse.com/1205902"
},
{
"category": "self",
"summary": "SUSE Bug 1205903",
"url": "https://bugzilla.suse.com/1205903"
},
{
"category": "self",
"summary": "SUSE Bug 1205904",
"url": "https://bugzilla.suse.com/1205904"
},
{
"category": "self",
"summary": "SUSE Bug 1205905",
"url": "https://bugzilla.suse.com/1205905"
},
{
"category": "self",
"summary": "SUSE Bug 1205906",
"url": "https://bugzilla.suse.com/1205906"
},
{
"category": "self",
"summary": "SUSE Bug 1205907",
"url": "https://bugzilla.suse.com/1205907"
},
{
"category": "self",
"summary": "SUSE Bug 1205908",
"url": "https://bugzilla.suse.com/1205908"
},
{
"category": "self",
"summary": "SUSE Bug 1206032",
"url": "https://bugzilla.suse.com/1206032"
},
{
"category": "self",
"summary": "SUSE Bug 1206037",
"url": "https://bugzilla.suse.com/1206037"
},
{
"category": "self",
"summary": "SUSE Bug 1206113",
"url": "https://bugzilla.suse.com/1206113"
},
{
"category": "self",
"summary": "SUSE Bug 1206114",
"url": "https://bugzilla.suse.com/1206114"
},
{
"category": "self",
"summary": "SUSE Bug 1206117",
"url": "https://bugzilla.suse.com/1206117"
},
{
"category": "self",
"summary": "SUSE Bug 1206118",
"url": "https://bugzilla.suse.com/1206118"
},
{
"category": "self",
"summary": "SUSE Bug 1206119",
"url": "https://bugzilla.suse.com/1206119"
},
{
"category": "self",
"summary": "SUSE Bug 1206120",
"url": "https://bugzilla.suse.com/1206120"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE Bug 1206213",
"url": "https://bugzilla.suse.com/1206213"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42328 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42329 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-16T12:29:50Z",
"generator": {
"date": "2022-12-16T12:29:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4505-1",
"initial_release_date": "2022-12-16T12:29:50Z",
"revision_history": [
{
"date": "2022-12-16T12:29:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.120.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.120.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.120.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.120.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.120.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.120.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.120.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.120.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.120.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.120.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.120.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.120.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.120.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.120.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.120.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.120.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.120.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.120.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.120.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.120.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.120.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.120.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.120.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.120.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.120.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.120.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.120.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.120.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.120.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.120.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.120.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.120.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.120.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.120.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.120.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.120.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.120.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.120.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.120.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.120.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.120.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.120.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.120.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.120.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.120.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.120.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.120.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.120.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.120.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3643"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3643",
"url": "https://www.suse.com/security/cve/CVE-2022-3643"
},
{
"category": "external",
"summary": "SUSE Bug 1206113 for CVE-2022-3643",
"url": "https://bugzilla.suse.com/1206113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "low"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42328"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42328",
"url": "https://www.suse.com/security/cve/CVE-2022-42328"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42328",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42329"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42329",
"url": "https://www.suse.com/security/cve/CVE-2022-42329"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42329",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.120.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.120.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T12:29:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
suse-su-2022:4533-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150100_197_120 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4533,SUSE-SLE-Live-Patching-12-SP4-2022-4533,SUSE-SLE-Live-Patching-12-SP4-2022-4535,SUSE-SLE-Live-Patching-12-SP4-2022-4538,SUSE-SLE-Live-Patching-12-SP5-2022-4530,SUSE-SLE-Live-Patching-12-SP5-2022-4536,SUSE-SLE-Live-Patching-12-SP5-2022-4540,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4537",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4533-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4533-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224533-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4533-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2022-12-17T18:34:12Z",
"generator": {
"date": "2022-12-17T18:34:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4533-1",
"initial_release_date": "2022-12-17T18:34:12Z",
"revision_history": [
{
"date": "2022-12-17T18:34:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
WID-SEC-W-2024-0064
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nBei den Switches der Juniper EX-Serie handelt es sich um Access- und Aggregations-/Core-Layer-Switches.\r\nDie Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren. \r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS Evolved, Juniper SRX Series, Juniper EX Series, Juniper QFX Series, Juniper ACX Series, Juniper PTX Series und Juniper MX Series ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und seine Berechtigungen zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0064 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0064.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0064 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0064"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11272 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA11272"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75233 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75233"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75721 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75721"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75723 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75723"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75725 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75725"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75727 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75727"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75729 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75729"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75730 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75730"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75733 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75733"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75734 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75734"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75735 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75735"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75736 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75736"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75737 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75737"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75738 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75738"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75740 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75740"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75741 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75741"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75742 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75742"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75743 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75743"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75744 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75744"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75745 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75745"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75747 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75747"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75748 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75748"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75752 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75752"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75753 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75753"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75754 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75754"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75755 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75755"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75757 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75757"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75758 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75758"
}
],
"source_lang": "en-US",
"title": "Juniper Produkte: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-01-10T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:03:31.626+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-0064",
"initial_release_date": "2024-01-10T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-01-10T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper EX Series",
"product": {
"name": "Juniper EX Series",
"product_id": "T019811",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:-"
}
}
},
{
"category": "product_name",
"name": "Juniper EX Series 4600",
"product": {
"name": "Juniper EX Series 4600",
"product_id": "T021598",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:ex4600"
}
}
},
{
"category": "product_name",
"name": "Juniper EX Series 4100",
"product": {
"name": "Juniper EX Series 4100",
"product_id": "T030475",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:4100"
}
}
},
{
"category": "product_name",
"name": "Juniper EX Series 4400",
"product": {
"name": "Juniper EX Series 4400",
"product_id": "T030476",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:4400"
}
}
},
{
"category": "product_name",
"name": "Juniper EX Series EX9200",
"product": {
"name": "Juniper EX Series EX9200",
"product_id": "T031997",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:ex9200"
}
}
}
],
"category": "product_name",
"name": "EX Series"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS Evolved",
"product": {
"name": "Juniper JUNOS Evolved",
"product_id": "T018886",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:evolved"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS PTX Series",
"product": {
"name": "Juniper JUNOS PTX Series",
"product_id": "T023853",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:ptx_series"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T030471",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS ACX7024",
"product": {
"name": "Juniper JUNOS ACX7024",
"product_id": "T031994",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:acx7024"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS ACX7100-32C",
"product": {
"name": "Juniper JUNOS ACX7100-32C",
"product_id": "T031995",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:acx7100-32c"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS ACX7100-48L",
"product": {
"name": "Juniper JUNOS ACX7100-48L",
"product_id": "T031996",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:acx7100-48l"
}
}
}
],
"category": "product_name",
"name": "JUNOS"
},
{
"category": "product_name",
"name": "Juniper MX Series",
"product": {
"name": "Juniper MX Series",
"product_id": "918766",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:mx:-"
}
}
},
{
"category": "product_name",
"name": "Juniper QFX Series 5000",
"product": {
"name": "Juniper QFX Series 5000",
"product_id": "T021597",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:qfx:qfx5000"
}
}
},
{
"category": "product_name",
"name": "Juniper SRX Series",
"product": {
"name": "Juniper SRX Series",
"product_id": "T021593",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:srx_service_gateways:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2873",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2873"
},
{
"cve": "CVE-2022-2795",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-25265",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-25265"
},
{
"cve": "CVE-2022-23307",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-23305",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23302",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-22942",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-2196",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2196"
},
{
"cve": "CVE-2022-21699",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-21699"
},
{
"cve": "CVE-2022-20141",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-1789",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-1789"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-0934",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-0934"
},
{
"cve": "CVE-2022-0330",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-0330"
},
{
"cve": "CVE-2021-44832",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-44832"
},
{
"cve": "CVE-2021-44790",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44228",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-44228"
},
{
"cve": "CVE-2021-4155",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-4155"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-3752",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3752"
},
{
"cve": "CVE-2021-3621",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3621"
},
{
"cve": "CVE-2021-3573",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3573"
},
{
"cve": "CVE-2021-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3564"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-33656",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-26691",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-26341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-25220",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-25220"
},
{
"cve": "CVE-2021-0920",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-0920"
},
{
"cve": "CVE-2020-9493",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2020-12321",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-12321"
},
{
"cve": "CVE-2020-0466",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-0466"
},
{
"cve": "CVE-2020-0465",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-0465"
},
{
"cve": "CVE-2019-17571",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2019-17571"
},
{
"cve": "CVE-2016-2183",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2016-2183"
},
{
"cve": "CVE-2024-21617",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21617"
},
{
"cve": "CVE-2024-21616",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21616"
},
{
"cve": "CVE-2024-21614",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21614"
},
{
"cve": "CVE-2024-21613",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21613"
},
{
"cve": "CVE-2024-21612",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21612"
},
{
"cve": "CVE-2024-21611",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21611"
},
{
"cve": "CVE-2024-21607",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21607"
},
{
"cve": "CVE-2024-21606",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21606"
},
{
"cve": "CVE-2024-21604",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21604"
},
{
"cve": "CVE-2024-21603",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21603"
},
{
"cve": "CVE-2024-21602",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21602"
},
{
"cve": "CVE-2024-21601",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21601"
},
{
"cve": "CVE-2024-21600",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21600"
},
{
"cve": "CVE-2024-21599",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21599"
},
{
"cve": "CVE-2024-21597",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21597"
},
{
"cve": "CVE-2024-21596",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21596"
},
{
"cve": "CVE-2024-21595",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21595"
},
{
"cve": "CVE-2024-21594",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21594"
},
{
"cve": "CVE-2024-21591",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21591"
},
{
"cve": "CVE-2024-21589",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21589"
},
{
"cve": "CVE-2024-21587",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21587"
},
{
"cve": "CVE-2024-21585",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21585"
},
{
"cve": "CVE-2023-38802",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-38802"
},
{
"cve": "CVE-2023-38408",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-3817",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-36842",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-36842"
},
{
"cve": "CVE-2023-3446",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-32360",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-26464",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-26464"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-23920",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-23920"
},
{
"cve": "CVE-2023-23918",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-23918"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-22809",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-2235",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2235"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22049",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22049"
},
{
"cve": "CVE-2023-22045",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22045"
},
{
"cve": "CVE-2023-21968",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-21967",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21954",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-2194",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21939",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-21938",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21937",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21930",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-2124",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-20593",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-20569",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-1829",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1829"
},
{
"cve": "CVE-2023-1582",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1582"
},
{
"cve": "CVE-2023-1281",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1281"
},
{
"cve": "CVE-2023-1195",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1195"
},
{
"cve": "CVE-2023-0767",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-0461",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0461"
},
{
"cve": "CVE-2023-0394",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-0386",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0386"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0266",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0266"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-43945",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42722",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42721",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42720",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-4269",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4269"
},
{
"cve": "CVE-2022-4254",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4254"
},
{
"cve": "CVE-2022-41974",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-41674",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-4139",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-41222",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-39189",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-38023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-38023"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-3707",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3625",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3623",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3623"
},
{
"cve": "CVE-2022-3619",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3619"
},
{
"cve": "CVE-2022-3567",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3566",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3239",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-30594",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3028"
}
]
}
wid-sec-w-2022-1964
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1964 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1964.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1964 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1964"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2022-11-06",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5755-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5755-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5754-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5754-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5728-2 vom 2022-12-02",
"url": "https://ubuntu.com/security/notices/USN-5755-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5773-1 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5773-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5754-2 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5754-2"
},
{
"category": "external",
"summary": "Red Hat Bug-Tracker 2090226 vom 2022-12-13",
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:8973 vom 2022-12-13",
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5779-1 vom 2022-12-14",
"url": "https://ubuntu.com/security/notices/USN-5779-1"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20221215-0006 vom 2022-12-15",
"url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:9082 vom 2022-12-15",
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4534-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4513-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4528-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4545-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4510-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013254.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4539-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4504-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4517-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4518-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4544-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4516-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4546-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4515-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4527-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4505-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4520-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4543-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4542-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4506-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4533-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4503-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4572-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4551-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4577-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4573-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4561-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4566-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4559-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4569-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4560-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4574-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4550-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4562-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4585-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4589-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4587-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4580-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4595-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4613-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4616-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4617-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4615-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4611-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4614-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5789-1 vom 2023-01-05",
"url": "https://ubuntu.com/security/notices/USN-5789-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5794-1 vom 2023-01-07",
"url": "https://ubuntu.com/security/notices/USN-5794-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5802-1 vom 2023-01-12",
"url": "https://ubuntu.com/security/notices/USN-5802-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5804-1 vom 2023-01-13",
"url": "https://ubuntu.com/security/notices/USN-5804-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5804-2 vom 2023-01-13",
"url": "https://ubuntu.com/security/notices/USN-5804-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5808-1 vom 2023-01-17",
"url": "https://ubuntu.com/security/notices/USN-5808-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5813-1 vom 2023-01-19",
"url": "https://ubuntu.com/security/notices/USN-5813-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0348 vom 2023-01-23",
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0334 vom 2023-01-23",
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0300 vom 2023-01-23",
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-0334 vom 2023-01-25",
"url": "http://linux.oracle.com/errata/ELSA-2023-0334.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5829-1 vom 2023-01-26",
"url": "https://ubuntu.com/security/notices/USN-5829-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5830-1 vom 2023-01-27",
"url": "https://ubuntu.com/security/notices/USN-5830-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5863-1 vom 2023-02-10",
"url": "https://ubuntu.com/security/notices/USN-5863-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5861-1 vom 2023-02-10",
"url": "https://ubuntu.com/security/notices/USN-5861-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5875-1 vom 2023-02-16",
"url": "https://ubuntu.com/security/notices/USN-5875-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0832 vom 2023-02-21",
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0839 vom 2023-02-21",
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0854 vom 2023-02-21",
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-0832 vom 2023-02-22",
"url": "http://linux.oracle.com/errata/ELSA-2023-0832.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5914-1 vom 2023-03-03",
"url": "https://ubuntu.com/security/notices/USN-5914-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5918-1 vom 2023-03-03",
"url": "https://ubuntu.com/security/notices/USN-5918-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0092-1 vom 2023-03-07",
"url": "https://ubuntu.com/security/notices/LSN-0092-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0932 vom 2023-03-09",
"url": "https://access.redhat.com/errata/RHSA-2023:0932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0931 vom 2023-03-09",
"url": "https://access.redhat.com/errata/RHSA-2023:0931"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0930 vom 2023-03-09",
"url": "https://access.redhat.com/errata/RHSA-2023:0930"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6965816 vom 2023-03-24",
"url": "https://www.ibm.com/support/pages/node/6965816"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2148-1 vom 2023-05-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014816.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2146-1 vom 2023-05-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014812.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2151-1 vom 2023-05-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014811.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2162-1 vom 2023-05-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014832.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2163-1 vom 2023-05-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014848.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-2458 vom 2023-06-28",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-June/014226.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2023-317 vom 2023-11-13",
"url": "https://www.dell.com/support/kbdoc/de-de/000219148/dsa-2023-317-security-update-for-dell-networker-vproxy-multiple-linux-packages-vulnerabilities"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5730 vom 2024-07-16",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00141.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-090 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-090.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:33:26.367+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2022-1964",
"initial_release_date": "2022-11-06T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-11-06T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-12-01T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-04T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-12T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-13T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-12-14T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-15T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von NetApp und Red Hat aufgenommen"
},
{
"date": "2022-12-18T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-26T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-05T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-08T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-12T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-15T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-17T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-23T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-01-25T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2023-01-29T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-02-09T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-02-21T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-22T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-03-02T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-05T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-07T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-08T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-03-23T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-05-09T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-10T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-18T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-06-28T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-11-12T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-07-15T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "41"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cvproxy 19.9.0.2",
"product": {
"name": "Dell NetWorker \u003cvproxy 19.9.0.2",
"product_id": "T030173"
}
},
{
"category": "product_version",
"name": "vproxy 19.9.0.2",
"product": {
"name": "Dell NetWorker vproxy 19.9.0.2",
"product_id": "T030173-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.9.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003cvproxy 19.8.0.3",
"product": {
"name": "Dell NetWorker \u003cvproxy 19.8.0.3",
"product_id": "T030174"
}
},
{
"category": "product_version",
"name": "vproxy 19.8.0.3",
"product": {
"name": "Dell NetWorker vproxy 19.8.0.3",
"product_id": "T030174-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.8.0.3"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.14",
"product": {
"name": "IBM Spectrum Protect \u003c10.1.14",
"product_id": "T026783"
}
},
{
"category": "product_version",
"name": "10.1.14",
"product": {
"name": "IBM Spectrum Protect 10.1.14",
"product_id": "T026783-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:10.1.14"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "658714",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-::~~~vmware_vsphere~~"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.19.17",
"product": {
"name": "Open Source Linux Kernel \u003c5.19.17",
"product_id": "1261474"
}
},
{
"category": "product_version",
"name": "5.19.17",
"product": {
"name": "Open Source Linux Kernel 5.19.17",
"product_id": "1261474-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:5.19.17"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.0.2",
"product": {
"name": "Open Source Linux Kernel \u003c6.0.2",
"product_id": "1261643"
}
},
{
"category": "product_version",
"name": "6.0.2",
"product": {
"name": "Open Source Linux Kernel 6.0.2",
"product_id": "1261643-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.0.2"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "5 Logging Subsystem",
"product": {
"name": "Red Hat OpenShift 5 Logging Subsystem",
"product_id": "T026681",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:5::logging_subsystem"
}
}
},
{
"category": "product_version",
"name": "Logging Subsystem 5.4.12",
"product": {
"name": "Red Hat OpenShift Logging Subsystem 5.4.12",
"product_id": "T026682",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:5.4.12::logging_subsystem"
}
}
},
{
"category": "product_version",
"name": "Logging Subsystem 5.6.3",
"product": {
"name": "Red Hat OpenShift Logging Subsystem 5.6.3",
"product_id": "T026683",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:5.6.3::logging_subsystem"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-43945",
"product_status": {
"known_affected": [
"T026681",
"67646",
"1261474",
"1261643",
"658714",
"T004914",
"T030174",
"T030173",
"2951",
"T002207",
"T000126",
"398363",
"T026783",
"T026682",
"T026683"
]
},
"release_date": "2022-11-06T23:00:00.000+00:00",
"title": "CVE-2022-43945"
}
]
}
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell ECS ist ein Objektspeichersystem.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0794 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0794 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04",
"url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-="
}
],
"source_lang": "en-US",
"title": "Dell ECS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T11:39:04.623+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0794",
"initial_release_date": "2024-04-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.8.1.0",
"product": {
"name": "Dell ECS \u003c3.8.1.0",
"product_id": "T033919"
}
},
{
"category": "product_version",
"name": "3.8.1.0",
"product": {
"name": "Dell ECS 3.8.1.0",
"product_id": "T033919-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:dell:ecs:3.8.1.0"
}
}
}
],
"category": "product_name",
"name": "ECS"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-18074",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2020-10663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10663"
},
{
"cve": "CVE-2020-10672",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10672"
},
{
"cve": "CVE-2020-10673",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10673"
},
{
"cve": "CVE-2020-10735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-10968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10968"
},
{
"cve": "CVE-2020-10969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10969"
},
{
"cve": "CVE-2020-11111",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11111"
},
{
"cve": "CVE-2020-11112",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11112"
},
{
"cve": "CVE-2020-11113",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11113"
},
{
"cve": "CVE-2020-11612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11612"
},
{
"cve": "CVE-2020-11619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11619"
},
{
"cve": "CVE-2020-11620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11620"
},
{
"cve": "CVE-2020-11979",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11979"
},
{
"cve": "CVE-2020-12762",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-12825",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12825"
},
{
"cve": "CVE-2020-13956",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-14060",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14060"
},
{
"cve": "CVE-2020-14061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14061"
},
{
"cve": "CVE-2020-14062",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14062"
},
{
"cve": "CVE-2020-14195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14195"
},
{
"cve": "CVE-2020-15250",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-15250"
},
{
"cve": "CVE-2020-1945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1945"
},
{
"cve": "CVE-2020-1967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1967"
},
{
"cve": "CVE-2020-1971",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-24616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24616"
},
{
"cve": "CVE-2020-24750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24750"
},
{
"cve": "CVE-2020-25649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25649"
},
{
"cve": "CVE-2020-25658",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25658"
},
{
"cve": "CVE-2020-26116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-26137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26137"
},
{
"cve": "CVE-2020-26541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2020-27216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27216"
},
{
"cve": "CVE-2020-27218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27218"
},
{
"cve": "CVE-2020-27223",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27223"
},
{
"cve": "CVE-2020-28366",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28493"
},
{
"cve": "CVE-2020-29509",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29509"
},
{
"cve": "CVE-2020-29511",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29511"
},
{
"cve": "CVE-2020-29582",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29582"
},
{
"cve": "CVE-2020-29651",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29651"
},
{
"cve": "CVE-2020-35490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35490"
},
{
"cve": "CVE-2020-35491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35491"
},
{
"cve": "CVE-2020-35728",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35728"
},
{
"cve": "CVE-2020-36179",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36179"
},
{
"cve": "CVE-2020-36180",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36180"
},
{
"cve": "CVE-2020-36181",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36181"
},
{
"cve": "CVE-2020-36182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36182"
},
{
"cve": "CVE-2020-36183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36183"
},
{
"cve": "CVE-2020-36184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36184"
},
{
"cve": "CVE-2020-36185",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36185"
},
{
"cve": "CVE-2020-36186",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36186"
},
{
"cve": "CVE-2020-36187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36187"
},
{
"cve": "CVE-2020-36188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36188"
},
{
"cve": "CVE-2020-36189",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36189"
},
{
"cve": "CVE-2020-36516",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2020-36518",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36518"
},
{
"cve": "CVE-2020-36557",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36557"
},
{
"cve": "CVE-2020-36558",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36558"
},
{
"cve": "CVE-2020-36691",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2020-7238",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-7238"
},
{
"cve": "CVE-2020-8840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8840"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2020-8911",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8911"
},
{
"cve": "CVE-2020-8912",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8912"
},
{
"cve": "CVE-2020-9488",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9488"
},
{
"cve": "CVE-2020-9493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2020-9546",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9546"
},
{
"cve": "CVE-2020-9547",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9547"
},
{
"cve": "CVE-2020-9548",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9548"
},
{
"cve": "CVE-2021-20190",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20190"
},
{
"cve": "CVE-2021-20323",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20323"
},
{
"cve": "CVE-2021-21290",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21290"
},
{
"cve": "CVE-2021-21295",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21295"
},
{
"cve": "CVE-2021-21409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21409"
},
{
"cve": "CVE-2021-23840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2021-23841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23841"
},
{
"cve": "CVE-2021-2471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-2471"
},
{
"cve": "CVE-2021-25642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-25642"
},
{
"cve": "CVE-2021-26341",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-28153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28153"
},
{
"cve": "CVE-2021-28165",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28165"
},
{
"cve": "CVE-2021-28169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28169"
},
{
"cve": "CVE-2021-28861",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28861"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-30560",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-30560"
},
{
"cve": "CVE-2021-3114",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-33036",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33036"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33656",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3424"
},
{
"cve": "CVE-2021-34428",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-34428"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3530",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3530"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36373"
},
{
"cve": "CVE-2021-36374",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36374"
},
{
"cve": "CVE-2021-3648",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3648"
},
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-3711",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3712",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-37136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37136"
},
{
"cve": "CVE-2021-37137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2021-37404",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37404"
},
{
"cve": "CVE-2021-37533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37533"
},
{
"cve": "CVE-2021-3754",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3754"
},
{
"cve": "CVE-2021-3778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3778"
},
{
"cve": "CVE-2021-3796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3796"
},
{
"cve": "CVE-2021-3826",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3826"
},
{
"cve": "CVE-2021-3827",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3827"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-3872",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3872"
},
{
"cve": "CVE-2021-3875",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3875"
},
{
"cve": "CVE-2021-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3903"
},
{
"cve": "CVE-2021-3923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3923"
},
{
"cve": "CVE-2021-3927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3927"
},
{
"cve": "CVE-2021-3928",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3928"
},
{
"cve": "CVE-2021-3968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3968"
},
{
"cve": "CVE-2021-3973",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3973"
},
{
"cve": "CVE-2021-3974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3974"
},
{
"cve": "CVE-2021-3984",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3984"
},
{
"cve": "CVE-2021-4019",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4019"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-4069",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4069"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-4136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4136"
},
{
"cve": "CVE-2021-4157",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2021-4166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-4192",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4192"
},
{
"cve": "CVE-2021-4193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-4203",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2021-42567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-42567"
},
{
"cve": "CVE-2021-43797",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-43797"
},
{
"cve": "CVE-2021-44531",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2021-44532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44532"
},
{
"cve": "CVE-2021-44533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44533"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44878",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44878"
},
{
"cve": "CVE-2021-45078",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-45078"
},
{
"cve": "CVE-2021-46195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46195"
},
{
"cve": "CVE-2021-46828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2021-46848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46848"
},
{
"cve": "CVE-2022-0128",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0128"
},
{
"cve": "CVE-2022-0213",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0213"
},
{
"cve": "CVE-2022-0225",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0225"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0392",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0407",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0407"
},
{
"cve": "CVE-2022-0413",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0561"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1245",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1245"
},
{
"cve": "CVE-2022-1271",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1271"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1381",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1466"
},
{
"cve": "CVE-2022-1471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-1586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1586"
},
{
"cve": "CVE-2022-1587",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1587"
},
{
"cve": "CVE-2022-1616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1720",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1729",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1785",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1851",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1897",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-1968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-1974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-20132",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-20166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20166"
},
{
"cve": "CVE-2022-20368",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2047",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2047"
},
{
"cve": "CVE-2022-2048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2048"
},
{
"cve": "CVE-2022-20567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20567"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-21216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21216"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-2129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-21363",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21363"
},
{
"cve": "CVE-2022-21385",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21385"
},
{
"cve": "CVE-2022-21499",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21540",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21540"
},
{
"cve": "CVE-2022-21541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21541"
},
{
"cve": "CVE-2022-21549",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21549"
},
{
"cve": "CVE-2022-21618",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21618"
},
{
"cve": "CVE-2022-21619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21619"
},
{
"cve": "CVE-2022-21624",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21624"
},
{
"cve": "CVE-2022-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21626"
},
{
"cve": "CVE-2022-21628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21628"
},
{
"cve": "CVE-2022-21702",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21702"
},
{
"cve": "CVE-2022-2175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-2183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2207",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2210",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2231",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2256",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2256"
},
{
"cve": "CVE-2022-2257",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2257"
},
{
"cve": "CVE-2022-2264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2284",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2285",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2285"
},
{
"cve": "CVE-2022-2286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2287",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-22976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22976"
},
{
"cve": "CVE-2022-22978",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22978"
},
{
"cve": "CVE-2022-2304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2304"
},
{
"cve": "CVE-2022-2318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-23302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-23305",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-2343",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2344",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23521"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-24302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24302"
},
{
"cve": "CVE-2022-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24329"
},
{
"cve": "CVE-2022-24823",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24823"
},
{
"cve": "CVE-2022-24903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24903"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25168",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25168"
},
{
"cve": "CVE-2022-2519",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2519"
},
{
"cve": "CVE-2022-2520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2520"
},
{
"cve": "CVE-2022-2521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2521"
},
{
"cve": "CVE-2022-2522",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2522"
},
{
"cve": "CVE-2022-25647",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25647"
},
{
"cve": "CVE-2022-2571",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2571"
},
{
"cve": "CVE-2022-2580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2580"
},
{
"cve": "CVE-2022-2581",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2581"
},
{
"cve": "CVE-2022-25857",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25857"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2598",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2598"
},
{
"cve": "CVE-2022-26148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26148"
},
{
"cve": "CVE-2022-26365",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-26612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26612"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-27943",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27943"
},
{
"cve": "CVE-2022-2795",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-2816",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2816"
},
{
"cve": "CVE-2022-2817",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2817"
},
{
"cve": "CVE-2022-2819",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2819"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2845",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2845"
},
{
"cve": "CVE-2022-2849",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2849"
},
{
"cve": "CVE-2022-2862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2862"
},
{
"cve": "CVE-2022-2867",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2867"
},
{
"cve": "CVE-2022-2868",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2868"
},
{
"cve": "CVE-2022-2869",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2869"
},
{
"cve": "CVE-2022-28693",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2874",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2874"
},
{
"cve": "CVE-2022-28748",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-2889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2889"
},
{
"cve": "CVE-2022-29162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29162"
},
{
"cve": "CVE-2022-29187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29187"
},
{
"cve": "CVE-2022-2923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2923"
},
{
"cve": "CVE-2022-2946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2946"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29583",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29583"
},
{
"cve": "CVE-2022-2964",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2977",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-2980",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2980"
},
{
"cve": "CVE-2022-2982",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2982"
},
{
"cve": "CVE-2022-29900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-2991",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2991"
},
{
"cve": "CVE-2022-3016",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3016"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3037"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-3099",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3099"
},
{
"cve": "CVE-2022-31030",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31030"
},
{
"cve": "CVE-2022-31159",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31159"
},
{
"cve": "CVE-2022-3134",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3134"
},
{
"cve": "CVE-2022-3153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3153"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-31690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31690"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-3234",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3234"
},
{
"cve": "CVE-2022-3235",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3235"
},
{
"cve": "CVE-2022-3239",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3278",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3278"
},
{
"cve": "CVE-2022-3296",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3296"
},
{
"cve": "CVE-2022-3297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3297"
},
{
"cve": "CVE-2022-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33196"
},
{
"cve": "CVE-2022-3324",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3324"
},
{
"cve": "CVE-2022-3352",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3352"
},
{
"cve": "CVE-2022-33740",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33972",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33972"
},
{
"cve": "CVE-2022-33981",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34266",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34266"
},
{
"cve": "CVE-2022-34526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34526"
},
{
"cve": "CVE-2022-34903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-3491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3491"
},
{
"cve": "CVE-2022-3515",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3515"
},
{
"cve": "CVE-2022-3520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3520"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-3542",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3591",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3591"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3597"
},
{
"cve": "CVE-2022-3599",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3599"
},
{
"cve": "CVE-2022-36109",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36109"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3626"
},
{
"cve": "CVE-2022-3627",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3627"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-36437",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36437"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3705"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-37865",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37865"
},
{
"cve": "CVE-2022-37866",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37866"
},
{
"cve": "CVE-2022-38090",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38090"
},
{
"cve": "CVE-2022-38096",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-38126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38126"
},
{
"cve": "CVE-2022-38127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38127"
},
{
"cve": "CVE-2022-38177",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38177"
},
{
"cve": "CVE-2022-38178",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38178"
},
{
"cve": "CVE-2022-3821",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3821"
},
{
"cve": "CVE-2022-38533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38533"
},
{
"cve": "CVE-2022-38749",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38749"
},
{
"cve": "CVE-2022-38750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38750"
},
{
"cve": "CVE-2022-38751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38751"
},
{
"cve": "CVE-2022-38752",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38752"
},
{
"cve": "CVE-2022-39028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39028"
},
{
"cve": "CVE-2022-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39399",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39399"
},
{
"cve": "CVE-2022-3970",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3970"
},
{
"cve": "CVE-2022-40149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40149"
},
{
"cve": "CVE-2022-40150",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2022-40151",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40151"
},
{
"cve": "CVE-2022-40152",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40152"
},
{
"cve": "CVE-2022-40153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40153"
},
{
"cve": "CVE-2022-40303",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4141"
},
{
"cve": "CVE-2022-41717",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41717"
},
{
"cve": "CVE-2022-41721",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41721"
},
{
"cve": "CVE-2022-41848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41854",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41854"
},
{
"cve": "CVE-2022-41858",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-41881",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41881"
},
{
"cve": "CVE-2022-41903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41903"
},
{
"cve": "CVE-2022-41915",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41915"
},
{
"cve": "CVE-2022-41966",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41966"
},
{
"cve": "CVE-2022-41974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42010",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42010"
},
{
"cve": "CVE-2022-42011",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42011"
},
{
"cve": "CVE-2022-42012",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42012"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42889"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42898"
},
{
"cve": "CVE-2022-4292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4292"
},
{
"cve": "CVE-2022-4293",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4293"
},
{
"cve": "CVE-2022-42969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42969"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-43680",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-43995",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43995"
},
{
"cve": "CVE-2022-4415",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4415"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-44638",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-44638"
},
{
"cve": "CVE-2022-45061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-45688",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45688"
},
{
"cve": "CVE-2022-45884",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2022-45939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45939"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-46751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46751"
},
{
"cve": "CVE-2022-46908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46908"
},
{
"cve": "CVE-2022-47629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47629"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-48281",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48281"
},
{
"cve": "CVE-2022-48337",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48339",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2023-0045",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-0049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0049"
},
{
"cve": "CVE-2023-0051",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0051"
},
{
"cve": "CVE-2023-0054",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0054"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0288",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0288"
},
{
"cve": "CVE-2023-0433",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0433"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0512",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0512"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0597"
},
{
"cve": "CVE-2023-0833",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0833"
},
{
"cve": "CVE-2023-1076",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1118",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1118"
},
{
"cve": "CVE-2023-1127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1127"
},
{
"cve": "CVE-2023-1170",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1170"
},
{
"cve": "CVE-2023-1175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1175"
},
{
"cve": "CVE-2023-1370",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2023-1380",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-1390",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1390"
},
{
"cve": "CVE-2023-1436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1436"
},
{
"cve": "CVE-2023-1513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1513"
},
{
"cve": "CVE-2023-1611",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-20862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-20862"
},
{
"cve": "CVE-2023-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2176",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21835",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21835"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21930",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21937",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21938",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-2194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21954",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-21967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-22490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22490"
},
{
"cve": "CVE-2023-2253",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2253"
},
{
"cve": "CVE-2023-22809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-23946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23946"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-24532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24532"
},
{
"cve": "CVE-2023-24534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24534"
},
{
"cve": "CVE-2023-2483",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-24998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-2513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2513"
},
{
"cve": "CVE-2023-25193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25652",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25652"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-25809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25809"
},
{
"cve": "CVE-2023-25815",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25815"
},
{
"cve": "CVE-2023-26048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26048"
},
{
"cve": "CVE-2023-26049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26049"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-26545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26545"
},
{
"cve": "CVE-2023-26604",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26604"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-27561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27561"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28320",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-28321",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28322",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-28464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28486",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28486"
},
{
"cve": "CVE-2023-28487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28487"
},
{
"cve": "CVE-2023-28642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28642"
},
{
"cve": "CVE-2023-28772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28772"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-29007",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29007"
},
{
"cve": "CVE-2023-29383",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29406",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29406"
},
{
"cve": "CVE-2023-29409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29409"
},
{
"cve": "CVE-2023-2976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-30772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30772"
},
{
"cve": "CVE-2023-31084",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3138",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-31436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-31484",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31484"
},
{
"cve": "CVE-2023-32269",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32269"
},
{
"cve": "CVE-2023-32697",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32697"
},
{
"cve": "CVE-2023-33264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-33264"
},
{
"cve": "CVE-2023-34034",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34034"
},
{
"cve": "CVE-2023-34035",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34035"
},
{
"cve": "CVE-2023-34453",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34453"
},
{
"cve": "CVE-2023-34454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34454"
},
{
"cve": "CVE-2023-34455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34455"
},
{
"cve": "CVE-2023-34462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34462"
},
{
"cve": "CVE-2023-35116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-35116"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-36479",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-36479"
},
{
"cve": "CVE-2023-39533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-39533"
},
{
"cve": "CVE-2023-40167",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40167"
},
{
"cve": "CVE-2023-40217",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-41105",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41105"
},
{
"cve": "CVE-2023-41900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41900"
},
{
"cve": "CVE-2023-43642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-43804",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2024-21626"
}
]
}
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell ECS ist ein Objektspeichersystem.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0794 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0794 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04",
"url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-="
}
],
"source_lang": "en-US",
"title": "Dell ECS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T11:39:04.623+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0794",
"initial_release_date": "2024-04-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.8.1.0",
"product": {
"name": "Dell ECS \u003c3.8.1.0",
"product_id": "T033919"
}
},
{
"category": "product_version",
"name": "3.8.1.0",
"product": {
"name": "Dell ECS 3.8.1.0",
"product_id": "T033919-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:dell:ecs:3.8.1.0"
}
}
}
],
"category": "product_name",
"name": "ECS"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-18074",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2020-10663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10663"
},
{
"cve": "CVE-2020-10672",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10672"
},
{
"cve": "CVE-2020-10673",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10673"
},
{
"cve": "CVE-2020-10735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-10968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10968"
},
{
"cve": "CVE-2020-10969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10969"
},
{
"cve": "CVE-2020-11111",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11111"
},
{
"cve": "CVE-2020-11112",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11112"
},
{
"cve": "CVE-2020-11113",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11113"
},
{
"cve": "CVE-2020-11612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11612"
},
{
"cve": "CVE-2020-11619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11619"
},
{
"cve": "CVE-2020-11620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11620"
},
{
"cve": "CVE-2020-11979",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11979"
},
{
"cve": "CVE-2020-12762",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-12825",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12825"
},
{
"cve": "CVE-2020-13956",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-14060",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14060"
},
{
"cve": "CVE-2020-14061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14061"
},
{
"cve": "CVE-2020-14062",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14062"
},
{
"cve": "CVE-2020-14195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14195"
},
{
"cve": "CVE-2020-15250",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-15250"
},
{
"cve": "CVE-2020-1945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1945"
},
{
"cve": "CVE-2020-1967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1967"
},
{
"cve": "CVE-2020-1971",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-24616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24616"
},
{
"cve": "CVE-2020-24750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24750"
},
{
"cve": "CVE-2020-25649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25649"
},
{
"cve": "CVE-2020-25658",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25658"
},
{
"cve": "CVE-2020-26116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-26137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26137"
},
{
"cve": "CVE-2020-26541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2020-27216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27216"
},
{
"cve": "CVE-2020-27218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27218"
},
{
"cve": "CVE-2020-27223",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27223"
},
{
"cve": "CVE-2020-28366",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28493"
},
{
"cve": "CVE-2020-29509",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29509"
},
{
"cve": "CVE-2020-29511",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29511"
},
{
"cve": "CVE-2020-29582",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29582"
},
{
"cve": "CVE-2020-29651",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29651"
},
{
"cve": "CVE-2020-35490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35490"
},
{
"cve": "CVE-2020-35491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35491"
},
{
"cve": "CVE-2020-35728",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35728"
},
{
"cve": "CVE-2020-36179",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36179"
},
{
"cve": "CVE-2020-36180",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36180"
},
{
"cve": "CVE-2020-36181",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36181"
},
{
"cve": "CVE-2020-36182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36182"
},
{
"cve": "CVE-2020-36183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36183"
},
{
"cve": "CVE-2020-36184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36184"
},
{
"cve": "CVE-2020-36185",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36185"
},
{
"cve": "CVE-2020-36186",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36186"
},
{
"cve": "CVE-2020-36187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36187"
},
{
"cve": "CVE-2020-36188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36188"
},
{
"cve": "CVE-2020-36189",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36189"
},
{
"cve": "CVE-2020-36516",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2020-36518",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36518"
},
{
"cve": "CVE-2020-36557",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36557"
},
{
"cve": "CVE-2020-36558",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36558"
},
{
"cve": "CVE-2020-36691",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2020-7238",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-7238"
},
{
"cve": "CVE-2020-8840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8840"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2020-8911",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8911"
},
{
"cve": "CVE-2020-8912",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8912"
},
{
"cve": "CVE-2020-9488",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9488"
},
{
"cve": "CVE-2020-9493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2020-9546",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9546"
},
{
"cve": "CVE-2020-9547",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9547"
},
{
"cve": "CVE-2020-9548",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9548"
},
{
"cve": "CVE-2021-20190",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20190"
},
{
"cve": "CVE-2021-20323",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20323"
},
{
"cve": "CVE-2021-21290",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21290"
},
{
"cve": "CVE-2021-21295",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21295"
},
{
"cve": "CVE-2021-21409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21409"
},
{
"cve": "CVE-2021-23840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2021-23841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23841"
},
{
"cve": "CVE-2021-2471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-2471"
},
{
"cve": "CVE-2021-25642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-25642"
},
{
"cve": "CVE-2021-26341",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-28153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28153"
},
{
"cve": "CVE-2021-28165",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28165"
},
{
"cve": "CVE-2021-28169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28169"
},
{
"cve": "CVE-2021-28861",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28861"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-30560",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-30560"
},
{
"cve": "CVE-2021-3114",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-33036",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33036"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33656",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3424"
},
{
"cve": "CVE-2021-34428",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-34428"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3530",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3530"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36373"
},
{
"cve": "CVE-2021-36374",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36374"
},
{
"cve": "CVE-2021-3648",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3648"
},
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-3711",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3712",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-37136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37136"
},
{
"cve": "CVE-2021-37137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2021-37404",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37404"
},
{
"cve": "CVE-2021-37533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37533"
},
{
"cve": "CVE-2021-3754",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3754"
},
{
"cve": "CVE-2021-3778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3778"
},
{
"cve": "CVE-2021-3796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3796"
},
{
"cve": "CVE-2021-3826",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3826"
},
{
"cve": "CVE-2021-3827",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3827"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-3872",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3872"
},
{
"cve": "CVE-2021-3875",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3875"
},
{
"cve": "CVE-2021-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3903"
},
{
"cve": "CVE-2021-3923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3923"
},
{
"cve": "CVE-2021-3927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3927"
},
{
"cve": "CVE-2021-3928",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3928"
},
{
"cve": "CVE-2021-3968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3968"
},
{
"cve": "CVE-2021-3973",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3973"
},
{
"cve": "CVE-2021-3974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3974"
},
{
"cve": "CVE-2021-3984",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3984"
},
{
"cve": "CVE-2021-4019",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4019"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-4069",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4069"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-4136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4136"
},
{
"cve": "CVE-2021-4157",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2021-4166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-4192",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4192"
},
{
"cve": "CVE-2021-4193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-4203",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2021-42567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-42567"
},
{
"cve": "CVE-2021-43797",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-43797"
},
{
"cve": "CVE-2021-44531",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2021-44532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44532"
},
{
"cve": "CVE-2021-44533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44533"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44878",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44878"
},
{
"cve": "CVE-2021-45078",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-45078"
},
{
"cve": "CVE-2021-46195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46195"
},
{
"cve": "CVE-2021-46828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2021-46848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46848"
},
{
"cve": "CVE-2022-0128",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0128"
},
{
"cve": "CVE-2022-0213",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0213"
},
{
"cve": "CVE-2022-0225",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0225"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0392",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0407",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0407"
},
{
"cve": "CVE-2022-0413",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0561"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1245",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1245"
},
{
"cve": "CVE-2022-1271",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1271"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1381",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1466"
},
{
"cve": "CVE-2022-1471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-1586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1586"
},
{
"cve": "CVE-2022-1587",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1587"
},
{
"cve": "CVE-2022-1616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1720",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1729",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1785",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1851",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1897",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-1968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-1974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-20132",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-20166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20166"
},
{
"cve": "CVE-2022-20368",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2047",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2047"
},
{
"cve": "CVE-2022-2048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2048"
},
{
"cve": "CVE-2022-20567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20567"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-21216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21216"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-2129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-21363",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21363"
},
{
"cve": "CVE-2022-21385",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21385"
},
{
"cve": "CVE-2022-21499",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21540",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21540"
},
{
"cve": "CVE-2022-21541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21541"
},
{
"cve": "CVE-2022-21549",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21549"
},
{
"cve": "CVE-2022-21618",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21618"
},
{
"cve": "CVE-2022-21619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21619"
},
{
"cve": "CVE-2022-21624",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21624"
},
{
"cve": "CVE-2022-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21626"
},
{
"cve": "CVE-2022-21628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21628"
},
{
"cve": "CVE-2022-21702",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21702"
},
{
"cve": "CVE-2022-2175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-2183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2207",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2210",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2231",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2256",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2256"
},
{
"cve": "CVE-2022-2257",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2257"
},
{
"cve": "CVE-2022-2264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2284",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2285",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2285"
},
{
"cve": "CVE-2022-2286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2287",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-22976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22976"
},
{
"cve": "CVE-2022-22978",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22978"
},
{
"cve": "CVE-2022-2304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2304"
},
{
"cve": "CVE-2022-2318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-23302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-23305",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-2343",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2344",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23521"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-24302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24302"
},
{
"cve": "CVE-2022-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24329"
},
{
"cve": "CVE-2022-24823",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24823"
},
{
"cve": "CVE-2022-24903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24903"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25168",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25168"
},
{
"cve": "CVE-2022-2519",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2519"
},
{
"cve": "CVE-2022-2520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2520"
},
{
"cve": "CVE-2022-2521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2521"
},
{
"cve": "CVE-2022-2522",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2522"
},
{
"cve": "CVE-2022-25647",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25647"
},
{
"cve": "CVE-2022-2571",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2571"
},
{
"cve": "CVE-2022-2580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2580"
},
{
"cve": "CVE-2022-2581",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2581"
},
{
"cve": "CVE-2022-25857",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25857"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2598",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2598"
},
{
"cve": "CVE-2022-26148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26148"
},
{
"cve": "CVE-2022-26365",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-26612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26612"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-27943",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27943"
},
{
"cve": "CVE-2022-2795",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-2816",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2816"
},
{
"cve": "CVE-2022-2817",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2817"
},
{
"cve": "CVE-2022-2819",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2819"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2845",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2845"
},
{
"cve": "CVE-2022-2849",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2849"
},
{
"cve": "CVE-2022-2862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2862"
},
{
"cve": "CVE-2022-2867",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2867"
},
{
"cve": "CVE-2022-2868",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2868"
},
{
"cve": "CVE-2022-2869",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2869"
},
{
"cve": "CVE-2022-28693",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2874",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2874"
},
{
"cve": "CVE-2022-28748",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-2889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2889"
},
{
"cve": "CVE-2022-29162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29162"
},
{
"cve": "CVE-2022-29187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29187"
},
{
"cve": "CVE-2022-2923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2923"
},
{
"cve": "CVE-2022-2946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2946"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29583",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29583"
},
{
"cve": "CVE-2022-2964",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2977",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-2980",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2980"
},
{
"cve": "CVE-2022-2982",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2982"
},
{
"cve": "CVE-2022-29900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-2991",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2991"
},
{
"cve": "CVE-2022-3016",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3016"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3037"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-3099",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3099"
},
{
"cve": "CVE-2022-31030",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31030"
},
{
"cve": "CVE-2022-31159",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31159"
},
{
"cve": "CVE-2022-3134",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3134"
},
{
"cve": "CVE-2022-3153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3153"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-31690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31690"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-3234",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3234"
},
{
"cve": "CVE-2022-3235",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3235"
},
{
"cve": "CVE-2022-3239",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3278",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3278"
},
{
"cve": "CVE-2022-3296",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3296"
},
{
"cve": "CVE-2022-3297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3297"
},
{
"cve": "CVE-2022-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33196"
},
{
"cve": "CVE-2022-3324",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3324"
},
{
"cve": "CVE-2022-3352",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3352"
},
{
"cve": "CVE-2022-33740",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33972",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33972"
},
{
"cve": "CVE-2022-33981",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34266",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34266"
},
{
"cve": "CVE-2022-34526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34526"
},
{
"cve": "CVE-2022-34903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-3491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3491"
},
{
"cve": "CVE-2022-3515",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3515"
},
{
"cve": "CVE-2022-3520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3520"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-3542",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3591",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3591"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3597"
},
{
"cve": "CVE-2022-3599",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3599"
},
{
"cve": "CVE-2022-36109",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36109"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3626"
},
{
"cve": "CVE-2022-3627",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3627"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-36437",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36437"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3705"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-37865",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37865"
},
{
"cve": "CVE-2022-37866",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37866"
},
{
"cve": "CVE-2022-38090",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38090"
},
{
"cve": "CVE-2022-38096",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-38126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38126"
},
{
"cve": "CVE-2022-38127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38127"
},
{
"cve": "CVE-2022-38177",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38177"
},
{
"cve": "CVE-2022-38178",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38178"
},
{
"cve": "CVE-2022-3821",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3821"
},
{
"cve": "CVE-2022-38533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38533"
},
{
"cve": "CVE-2022-38749",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38749"
},
{
"cve": "CVE-2022-38750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38750"
},
{
"cve": "CVE-2022-38751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38751"
},
{
"cve": "CVE-2022-38752",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38752"
},
{
"cve": "CVE-2022-39028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39028"
},
{
"cve": "CVE-2022-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39399",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39399"
},
{
"cve": "CVE-2022-3970",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3970"
},
{
"cve": "CVE-2022-40149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40149"
},
{
"cve": "CVE-2022-40150",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2022-40151",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40151"
},
{
"cve": "CVE-2022-40152",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40152"
},
{
"cve": "CVE-2022-40153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40153"
},
{
"cve": "CVE-2022-40303",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4141"
},
{
"cve": "CVE-2022-41717",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41717"
},
{
"cve": "CVE-2022-41721",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41721"
},
{
"cve": "CVE-2022-41848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41854",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41854"
},
{
"cve": "CVE-2022-41858",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-41881",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41881"
},
{
"cve": "CVE-2022-41903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41903"
},
{
"cve": "CVE-2022-41915",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41915"
},
{
"cve": "CVE-2022-41966",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41966"
},
{
"cve": "CVE-2022-41974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42010",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42010"
},
{
"cve": "CVE-2022-42011",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42011"
},
{
"cve": "CVE-2022-42012",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42012"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42889"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42898"
},
{
"cve": "CVE-2022-4292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4292"
},
{
"cve": "CVE-2022-4293",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4293"
},
{
"cve": "CVE-2022-42969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42969"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-43680",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-43995",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43995"
},
{
"cve": "CVE-2022-4415",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4415"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-44638",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-44638"
},
{
"cve": "CVE-2022-45061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-45688",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45688"
},
{
"cve": "CVE-2022-45884",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2022-45939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45939"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-46751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46751"
},
{
"cve": "CVE-2022-46908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46908"
},
{
"cve": "CVE-2022-47629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47629"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-48281",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48281"
},
{
"cve": "CVE-2022-48337",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48339",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2023-0045",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-0049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0049"
},
{
"cve": "CVE-2023-0051",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0051"
},
{
"cve": "CVE-2023-0054",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0054"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0288",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0288"
},
{
"cve": "CVE-2023-0433",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0433"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0512",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0512"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0597"
},
{
"cve": "CVE-2023-0833",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0833"
},
{
"cve": "CVE-2023-1076",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1118",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1118"
},
{
"cve": "CVE-2023-1127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1127"
},
{
"cve": "CVE-2023-1170",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1170"
},
{
"cve": "CVE-2023-1175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1175"
},
{
"cve": "CVE-2023-1370",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2023-1380",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-1390",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1390"
},
{
"cve": "CVE-2023-1436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1436"
},
{
"cve": "CVE-2023-1513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1513"
},
{
"cve": "CVE-2023-1611",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-20862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-20862"
},
{
"cve": "CVE-2023-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2176",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21835",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21835"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21930",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21937",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21938",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-2194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21954",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-21967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-22490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22490"
},
{
"cve": "CVE-2023-2253",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2253"
},
{
"cve": "CVE-2023-22809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-23946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23946"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-24532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24532"
},
{
"cve": "CVE-2023-24534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24534"
},
{
"cve": "CVE-2023-2483",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-24998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-2513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2513"
},
{
"cve": "CVE-2023-25193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25652",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25652"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-25809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25809"
},
{
"cve": "CVE-2023-25815",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25815"
},
{
"cve": "CVE-2023-26048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26048"
},
{
"cve": "CVE-2023-26049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26049"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-26545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26545"
},
{
"cve": "CVE-2023-26604",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26604"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-27561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27561"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28320",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-28321",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28322",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-28464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28486",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28486"
},
{
"cve": "CVE-2023-28487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28487"
},
{
"cve": "CVE-2023-28642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28642"
},
{
"cve": "CVE-2023-28772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28772"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-29007",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29007"
},
{
"cve": "CVE-2023-29383",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29406",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29406"
},
{
"cve": "CVE-2023-29409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29409"
},
{
"cve": "CVE-2023-2976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-30772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30772"
},
{
"cve": "CVE-2023-31084",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3138",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-31436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-31484",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31484"
},
{
"cve": "CVE-2023-32269",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32269"
},
{
"cve": "CVE-2023-32697",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32697"
},
{
"cve": "CVE-2023-33264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-33264"
},
{
"cve": "CVE-2023-34034",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34034"
},
{
"cve": "CVE-2023-34035",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34035"
},
{
"cve": "CVE-2023-34453",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34453"
},
{
"cve": "CVE-2023-34454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34454"
},
{
"cve": "CVE-2023-34455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34455"
},
{
"cve": "CVE-2023-34462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34462"
},
{
"cve": "CVE-2023-35116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-35116"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-36479",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-36479"
},
{
"cve": "CVE-2023-39533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-39533"
},
{
"cve": "CVE-2023-40167",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40167"
},
{
"cve": "CVE-2023-40217",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-41105",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41105"
},
{
"cve": "CVE-2023-41900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41900"
},
{
"cve": "CVE-2023-43642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-43804",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2024-21626"
}
]
}
wid-sec-w-2024-0064
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nBei den Switches der Juniper EX-Serie handelt es sich um Access- und Aggregations-/Core-Layer-Switches.\r\nDie Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren. \r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS Evolved, Juniper SRX Series, Juniper EX Series, Juniper QFX Series, Juniper ACX Series, Juniper PTX Series und Juniper MX Series ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und seine Berechtigungen zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0064 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0064.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0064 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0064"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11272 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA11272"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75233 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75233"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75721 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75721"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75723 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75723"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75725 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75725"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75727 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75727"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75729 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75729"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75730 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75730"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75733 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75733"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75734 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75734"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75735 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75735"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75736 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75736"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75737 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75737"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75738 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75738"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75740 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75740"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75741 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75741"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75742 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75742"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75743 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75743"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75744 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75744"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75745 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75745"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75747 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75747"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75748 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75748"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75752 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75752"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75753 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75753"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75754 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75754"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75755 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75755"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75757 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75757"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75758 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75758"
}
],
"source_lang": "en-US",
"title": "Juniper Produkte: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-01-10T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:03:31.626+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-0064",
"initial_release_date": "2024-01-10T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-01-10T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper EX Series",
"product": {
"name": "Juniper EX Series",
"product_id": "T019811",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:-"
}
}
},
{
"category": "product_name",
"name": "Juniper EX Series 4600",
"product": {
"name": "Juniper EX Series 4600",
"product_id": "T021598",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:ex4600"
}
}
},
{
"category": "product_name",
"name": "Juniper EX Series 4100",
"product": {
"name": "Juniper EX Series 4100",
"product_id": "T030475",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:4100"
}
}
},
{
"category": "product_name",
"name": "Juniper EX Series 4400",
"product": {
"name": "Juniper EX Series 4400",
"product_id": "T030476",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:4400"
}
}
},
{
"category": "product_name",
"name": "Juniper EX Series EX9200",
"product": {
"name": "Juniper EX Series EX9200",
"product_id": "T031997",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:ex9200"
}
}
}
],
"category": "product_name",
"name": "EX Series"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS Evolved",
"product": {
"name": "Juniper JUNOS Evolved",
"product_id": "T018886",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:evolved"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS PTX Series",
"product": {
"name": "Juniper JUNOS PTX Series",
"product_id": "T023853",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:ptx_series"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T030471",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS ACX7024",
"product": {
"name": "Juniper JUNOS ACX7024",
"product_id": "T031994",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:acx7024"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS ACX7100-32C",
"product": {
"name": "Juniper JUNOS ACX7100-32C",
"product_id": "T031995",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:acx7100-32c"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS ACX7100-48L",
"product": {
"name": "Juniper JUNOS ACX7100-48L",
"product_id": "T031996",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:acx7100-48l"
}
}
}
],
"category": "product_name",
"name": "JUNOS"
},
{
"category": "product_name",
"name": "Juniper MX Series",
"product": {
"name": "Juniper MX Series",
"product_id": "918766",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:mx:-"
}
}
},
{
"category": "product_name",
"name": "Juniper QFX Series 5000",
"product": {
"name": "Juniper QFX Series 5000",
"product_id": "T021597",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:qfx:qfx5000"
}
}
},
{
"category": "product_name",
"name": "Juniper SRX Series",
"product": {
"name": "Juniper SRX Series",
"product_id": "T021593",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:srx_service_gateways:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2873",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2873"
},
{
"cve": "CVE-2022-2795",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-25265",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-25265"
},
{
"cve": "CVE-2022-23307",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-23305",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23302",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-22942",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-2196",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2196"
},
{
"cve": "CVE-2022-21699",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-21699"
},
{
"cve": "CVE-2022-20141",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-1789",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-1789"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-0934",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-0934"
},
{
"cve": "CVE-2022-0330",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-0330"
},
{
"cve": "CVE-2021-44832",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-44832"
},
{
"cve": "CVE-2021-44790",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44228",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-44228"
},
{
"cve": "CVE-2021-4155",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-4155"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-3752",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3752"
},
{
"cve": "CVE-2021-3621",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3621"
},
{
"cve": "CVE-2021-3573",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3573"
},
{
"cve": "CVE-2021-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3564"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-33656",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-26691",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-26341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-25220",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-25220"
},
{
"cve": "CVE-2021-0920",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-0920"
},
{
"cve": "CVE-2020-9493",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2020-12321",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-12321"
},
{
"cve": "CVE-2020-0466",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-0466"
},
{
"cve": "CVE-2020-0465",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-0465"
},
{
"cve": "CVE-2019-17571",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2019-17571"
},
{
"cve": "CVE-2016-2183",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2016-2183"
},
{
"cve": "CVE-2024-21617",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21617"
},
{
"cve": "CVE-2024-21616",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21616"
},
{
"cve": "CVE-2024-21614",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21614"
},
{
"cve": "CVE-2024-21613",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21613"
},
{
"cve": "CVE-2024-21612",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21612"
},
{
"cve": "CVE-2024-21611",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21611"
},
{
"cve": "CVE-2024-21607",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21607"
},
{
"cve": "CVE-2024-21606",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21606"
},
{
"cve": "CVE-2024-21604",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21604"
},
{
"cve": "CVE-2024-21603",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21603"
},
{
"cve": "CVE-2024-21602",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21602"
},
{
"cve": "CVE-2024-21601",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21601"
},
{
"cve": "CVE-2024-21600",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21600"
},
{
"cve": "CVE-2024-21599",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21599"
},
{
"cve": "CVE-2024-21597",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21597"
},
{
"cve": "CVE-2024-21596",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21596"
},
{
"cve": "CVE-2024-21595",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21595"
},
{
"cve": "CVE-2024-21594",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21594"
},
{
"cve": "CVE-2024-21591",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21591"
},
{
"cve": "CVE-2024-21589",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21589"
},
{
"cve": "CVE-2024-21587",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21587"
},
{
"cve": "CVE-2024-21585",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21585"
},
{
"cve": "CVE-2023-38802",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-38802"
},
{
"cve": "CVE-2023-38408",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-3817",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-36842",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-36842"
},
{
"cve": "CVE-2023-3446",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-32360",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-26464",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-26464"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-23920",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-23920"
},
{
"cve": "CVE-2023-23918",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-23918"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-22809",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-2235",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2235"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22049",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22049"
},
{
"cve": "CVE-2023-22045",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22045"
},
{
"cve": "CVE-2023-21968",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-21967",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21954",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-2194",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21939",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-21938",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21937",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21930",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-2124",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-20593",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-20569",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-1829",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1829"
},
{
"cve": "CVE-2023-1582",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1582"
},
{
"cve": "CVE-2023-1281",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1281"
},
{
"cve": "CVE-2023-1195",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1195"
},
{
"cve": "CVE-2023-0767",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-0461",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0461"
},
{
"cve": "CVE-2023-0394",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-0386",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0386"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0266",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0266"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-43945",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42722",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42721",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42720",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-4269",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4269"
},
{
"cve": "CVE-2022-4254",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4254"
},
{
"cve": "CVE-2022-41974",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-41674",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-4139",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-41222",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-39189",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-38023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-38023"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-3707",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3625",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3623",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3623"
},
{
"cve": "CVE-2022-3619",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3619"
},
{
"cve": "CVE-2022-3567",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3566",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3239",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-30594",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3028"
}
]
}
WID-SEC-W-2022-1964
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1964 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1964.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1964 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1964"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2022-11-06",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5755-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5755-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5754-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5754-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5728-2 vom 2022-12-02",
"url": "https://ubuntu.com/security/notices/USN-5755-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5773-1 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5773-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5754-2 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5754-2"
},
{
"category": "external",
"summary": "Red Hat Bug-Tracker 2090226 vom 2022-12-13",
"url": "https://access.redhat.com/errata/RHSA-2022:8974"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:8973 vom 2022-12-13",
"url": "https://access.redhat.com/errata/RHSA-2022:8973"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5779-1 vom 2022-12-14",
"url": "https://ubuntu.com/security/notices/USN-5779-1"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20221215-0006 vom 2022-12-15",
"url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:9082 vom 2022-12-15",
"url": "https://access.redhat.com/errata/RHSA-2022:9082"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4534-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4513-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4528-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4545-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4510-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013254.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4539-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4504-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4517-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4518-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4544-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4516-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4546-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4515-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4527-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4505-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4520-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4543-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4542-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4506-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4533-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4503-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4572-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4551-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4577-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4573-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4561-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4566-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4559-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4569-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4560-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4574-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4550-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4562-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4585-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4589-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4587-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4580-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4595-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4613-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4616-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4617-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4615-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4611-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4614-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5789-1 vom 2023-01-05",
"url": "https://ubuntu.com/security/notices/USN-5789-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5794-1 vom 2023-01-07",
"url": "https://ubuntu.com/security/notices/USN-5794-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5802-1 vom 2023-01-12",
"url": "https://ubuntu.com/security/notices/USN-5802-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5804-1 vom 2023-01-13",
"url": "https://ubuntu.com/security/notices/USN-5804-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5804-2 vom 2023-01-13",
"url": "https://ubuntu.com/security/notices/USN-5804-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5808-1 vom 2023-01-17",
"url": "https://ubuntu.com/security/notices/USN-5808-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5813-1 vom 2023-01-19",
"url": "https://ubuntu.com/security/notices/USN-5813-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0348 vom 2023-01-23",
"url": "https://access.redhat.com/errata/RHSA-2023:0348"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0334 vom 2023-01-23",
"url": "https://access.redhat.com/errata/RHSA-2023:0334"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0300 vom 2023-01-23",
"url": "https://access.redhat.com/errata/RHSA-2023:0300"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-0334 vom 2023-01-25",
"url": "http://linux.oracle.com/errata/ELSA-2023-0334.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5829-1 vom 2023-01-26",
"url": "https://ubuntu.com/security/notices/USN-5829-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5830-1 vom 2023-01-27",
"url": "https://ubuntu.com/security/notices/USN-5830-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5863-1 vom 2023-02-10",
"url": "https://ubuntu.com/security/notices/USN-5863-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5861-1 vom 2023-02-10",
"url": "https://ubuntu.com/security/notices/USN-5861-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5875-1 vom 2023-02-16",
"url": "https://ubuntu.com/security/notices/USN-5875-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0832 vom 2023-02-21",
"url": "https://access.redhat.com/errata/RHSA-2023:0832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0839 vom 2023-02-21",
"url": "https://access.redhat.com/errata/RHSA-2023:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0854 vom 2023-02-21",
"url": "https://access.redhat.com/errata/RHSA-2023:0854"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-0832 vom 2023-02-22",
"url": "http://linux.oracle.com/errata/ELSA-2023-0832.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5914-1 vom 2023-03-03",
"url": "https://ubuntu.com/security/notices/USN-5914-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5918-1 vom 2023-03-03",
"url": "https://ubuntu.com/security/notices/USN-5918-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0092-1 vom 2023-03-07",
"url": "https://ubuntu.com/security/notices/LSN-0092-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0932 vom 2023-03-09",
"url": "https://access.redhat.com/errata/RHSA-2023:0932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0931 vom 2023-03-09",
"url": "https://access.redhat.com/errata/RHSA-2023:0931"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:0930 vom 2023-03-09",
"url": "https://access.redhat.com/errata/RHSA-2023:0930"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6965816 vom 2023-03-24",
"url": "https://www.ibm.com/support/pages/node/6965816"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2148-1 vom 2023-05-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014816.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2146-1 vom 2023-05-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014812.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2151-1 vom 2023-05-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014811.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2162-1 vom 2023-05-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014832.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2163-1 vom 2023-05-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014848.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-2458 vom 2023-06-28",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-June/014226.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2023-317 vom 2023-11-13",
"url": "https://www.dell.com/support/kbdoc/de-de/000219148/dsa-2023-317-security-update-for-dell-networker-vproxy-multiple-linux-packages-vulnerabilities"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5730 vom 2024-07-16",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00141.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-090 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-090.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:33:26.367+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2022-1964",
"initial_release_date": "2022-11-06T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-11-06T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-12-01T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-04T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-12T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-13T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-12-14T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-15T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von NetApp und Red Hat aufgenommen"
},
{
"date": "2022-12-18T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-26T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-05T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-08T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-12T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-15T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-17T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-23T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-01-25T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2023-01-29T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-02-09T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-02-21T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-22T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-03-02T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-05T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-07T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-08T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-03-23T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-05-09T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-10T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-05-18T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-06-28T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-11-12T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-07-15T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "41"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cvproxy 19.9.0.2",
"product": {
"name": "Dell NetWorker \u003cvproxy 19.9.0.2",
"product_id": "T030173"
}
},
{
"category": "product_version",
"name": "vproxy 19.9.0.2",
"product": {
"name": "Dell NetWorker vproxy 19.9.0.2",
"product_id": "T030173-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.9.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003cvproxy 19.8.0.3",
"product": {
"name": "Dell NetWorker \u003cvproxy 19.8.0.3",
"product_id": "T030174"
}
},
{
"category": "product_version",
"name": "vproxy 19.8.0.3",
"product": {
"name": "Dell NetWorker vproxy 19.8.0.3",
"product_id": "T030174-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy_19.8.0.3"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.14",
"product": {
"name": "IBM Spectrum Protect \u003c10.1.14",
"product_id": "T026783"
}
},
{
"category": "product_version",
"name": "10.1.14",
"product": {
"name": "IBM Spectrum Protect 10.1.14",
"product_id": "T026783-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:10.1.14"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "658714",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-::~~~vmware_vsphere~~"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.19.17",
"product": {
"name": "Open Source Linux Kernel \u003c5.19.17",
"product_id": "1261474"
}
},
{
"category": "product_version",
"name": "5.19.17",
"product": {
"name": "Open Source Linux Kernel 5.19.17",
"product_id": "1261474-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:5.19.17"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.0.2",
"product": {
"name": "Open Source Linux Kernel \u003c6.0.2",
"product_id": "1261643"
}
},
{
"category": "product_version",
"name": "6.0.2",
"product": {
"name": "Open Source Linux Kernel 6.0.2",
"product_id": "1261643-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.0.2"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "5 Logging Subsystem",
"product": {
"name": "Red Hat OpenShift 5 Logging Subsystem",
"product_id": "T026681",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:5::logging_subsystem"
}
}
},
{
"category": "product_version",
"name": "Logging Subsystem 5.4.12",
"product": {
"name": "Red Hat OpenShift Logging Subsystem 5.4.12",
"product_id": "T026682",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:5.4.12::logging_subsystem"
}
}
},
{
"category": "product_version",
"name": "Logging Subsystem 5.6.3",
"product": {
"name": "Red Hat OpenShift Logging Subsystem 5.6.3",
"product_id": "T026683",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:5.6.3::logging_subsystem"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-43945",
"product_status": {
"known_affected": [
"T026681",
"67646",
"1261474",
"1261643",
"658714",
"T004914",
"T030174",
"T030173",
"2951",
"T002207",
"T000126",
"398363",
"T026783",
"T026682",
"T026683"
]
},
"release_date": "2022-11-06T23:00:00.000+00:00",
"title": "CVE-2022-43945"
}
]
}
fkie_cve-2022-43945
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| disclosure@synopsys.com | http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html | ||
| disclosure@synopsys.com | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8 | Mailing List, Patch, Vendor Advisory | |
| disclosure@synopsys.com | https://security.netapp.com/advisory/ntap-20221215-0006/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8 | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221215-0006/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| netapp | active_iq_unified_manager | - | |
| netapp | h300s_firmware | - | |
| netapp | h300s | - | |
| netapp | h500s_firmware | - | |
| netapp | h500s | - | |
| netapp | h700s_firmware | - | |
| netapp | h700s | - | |
| netapp | h410s_firmware | - | |
| netapp | h410s | - | |
| netapp | h410c_firmware | - | |
| netapp | h410c | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E287B74B-5F32-4BA9-801E-4C57E101C790",
"versionEndExcluding": "5.19.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0624AD1-5A88-463E-96D1-F938FCBA6EEA",
"versionEndExcluding": "6.0.2",
"versionStartIncluding": "6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"lang": "es",
"value": "La implementaci\u00f3n NFSD del kernel de Linux anterior a las versiones 5.19.17 y 6.0.2 es vulnerable al desbordamiento del b\u00fafer. NFSD rastrea el n\u00famero de p\u00e1ginas retenidas por cada subproceso NFSD combinando los b\u00faferes de recepci\u00f3n y env\u00edo de una llamada a procedimiento remoto (RPC) en una \u00fanica matriz de p\u00e1ginas. Un cliente puede forzar la reducci\u00f3n del b\u00fafer de env\u00edo enviando un mensaje RPC a trav\u00e9s de TCP con datos basura agregados al final del mensaje. El mensaje RPC con datos basura todav\u00eda est\u00e1 formado correctamente seg\u00fan la especificaci\u00f3n y se pasa a los controladores. El c\u00f3digo vulnerable en NFSD no espera la solicitud de gran tama\u00f1o y escribe m\u00e1s all\u00e1 del espacio de b\u00fafer asignado. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H "
}
],
"id": "CVE-2022-43945",
"lastModified": "2025-05-01T19:15:55.283",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-11-04T19:15:11.180",
"references": [
{
"source": "disclosure@synopsys.com",
"url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"
},
{
"source": "disclosure@synopsys.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
},
{
"source": "disclosure@synopsys.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
}
],
"sourceIdentifier": "disclosure@synopsys.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-131"
}
],
"source": "disclosure@synopsys.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
icsa-24-102-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1.\n\nSiemens is preparing fix versions and recommends specific countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy \u0026 Use policy (https://www.cisa.gov/privacy-policy).",
"title": "Legal Notice and Terms of Use"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-265688 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-265688.json"
},
{
"category": "self",
"summary": "SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-265688.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-102-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-102-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-102-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-102-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/news/targeted-cyber-intrusion-detection-and-mitigation-strategies-update-b"
}
],
"title": "Siemens SIMATIC S7-1500",
"tracking": {
"current_release_date": "2025-10-14T00:00:00.000000Z",
"generator": {
"date": "2025-10-16T21:33:14.845754Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-102-01",
"initial_release_date": "2024-04-09T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-04-09T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-05-14T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2024-2511"
},
{
"date": "2024-07-09T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2024-5535"
},
{
"date": "2024-11-12T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added CVE-2024-9143"
},
{
"date": "2025-03-11T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added CVE-2024-36484, CVE-2024-36902, CVE-2024-36904, CVE-2024-36905, CVE-2024-36916, CVE-2024-36929, CVE-2024-36939, CVE-2024-36940, CVE-2024-36959, CVE-2024-44987, CVE-2024-44989, CVE-2024-44990, CVE-2024-45016, CVE-2024-45018, CVE-2024-46679, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46750, CVE-2024-46759, CVE-2024-46783, CVE-2024-47660, CVE-2024-50299, CVE-2024-50301, CVE-2024-53101"
},
{
"date": "2025-04-08T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added CVE-2024-50302 (incl. product-specific impact description) and multiple other CVEs"
},
{
"date": "2025-06-10T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added 63 CVEs"
},
{
"date": "2025-07-08T00:00:00.000000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added 71 CVEs"
},
{
"date": "2025-08-12T00:00:00.000000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Added 147 CVEs"
},
{
"date": "2025-09-09T00:00:00.000000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Added 51 CVEs"
},
{
"date": "2025-10-14T00:00:00.000000Z",
"legacy_version": "2.0",
"number": "11",
"summary": "Added CVE-2025-9230, CVE-2023-50781, CVE-2023-6129, CVE-2023-6237, CVE-2024-0727"
}
],
"status": "final",
"version": "11"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC S7-1500 TM MFP - GNU/Linux subsystem",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP - GNU/Linux subsystem"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4090",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-4090"
},
{
"cve": "CVE-2021-38202",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-38202"
},
{
"cve": "CVE-2021-47002",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "SUNRPC: null pointer dereference in svc_rqst_free(). When alloc_pages_node() returns null in svc_rqst_alloc(), the null rq_scratch_page pointer will be dereferenced when calling put_page() in svc_rqst_free().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-47002"
},
{
"cve": "CVE-2021-47107",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "NFSD: READDIR buffer overflow. If a client sends a READDIR count argument that is too small (say, zero), then the buffer size calculation in the new init_dirlist helper functions results in an underflow, allowing the XDR stream functions to write beyond the actual buffer. This calculation has always been suspect. NFSD has never sanity- checked the READDIR count argument, but the old entry encoders managed the problem correctly. With the commits below, entry encoding changed, exposing the underflow to the pointer arithmetic in xdr_reserve_space(). Modern NFS clients attempt to retrieve as much data as possible for each READDIR request.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-47107"
},
{
"cve": "CVE-2021-47316",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfsd: NULL dereference in nfs3svc_encode_getaclres.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-47316"
},
{
"cve": "CVE-2022-38096",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file \u0027/dev/dri/renderD128 (or Dxxx)\u0027. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-48827",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "NFSD: vulnerability caused by loff_t overflow on the server when a client reads near the maximum offset, causing the server to return an EINVAL error, which the client retries indefinitely, instead of handling out-of-range READ requests by returning a short result with an EOF flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-48827"
},
{
"cve": "CVE-2022-48828",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NFSD: Vulnerability caused by an underflow in ia_size due to a mismatch between signed and unsigned 64-bit file size values, which can cause issues when handling large file sizes from NFS clients.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-48828"
},
{
"cve": "CVE-2022-48829",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"notes": [
{
"category": "summary",
"text": "NFSD: Vulnerability handling large file sizes for NFSv3 improperly capping client size values larger than s64_max, leading to unexpected behavior and potential data corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-48829"
},
{
"cve": "CVE-2023-1652",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-1652"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-6121",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6121"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions.\r\n\r\nIf an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences.\r\n\r\nThe POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions.\r\n\r\nThe consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However unless the compiler uses the vector registers for storing pointers, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service.\r\n\r\nThe POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3. If this cipher is enabled on the server a malicious client can influence whether this AEAD cipher is used. This implies that TLS server applications using OpenSSL can be potentially impacted. However\r\nwe are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-6237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Checking excessively long invalid RSA public keys may take a long time. Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that application is also vulnerable if used with the \u0027-pubin\u0027 and \u0027-check\u0027 options on untrusted data. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6237"
},
{
"cve": "CVE-2023-6817",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6817"
},
{
"cve": "CVE-2023-6931",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-28746",
"cwe": {
"id": "CWE-1342",
"name": "Information Exposure through Microarchitectural State after Transient Execution"
},
"notes": [
{
"category": "summary",
"text": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-45898",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-45898"
},
{
"cve": "CVE-2023-47233",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-47233"
},
{
"cve": "CVE-2023-50781",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-50781"
},
{
"cve": "CVE-2023-52447",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Defer the free of inner map when necessary when updating or deleting an inner map in map array or map htab, the map may still be accessed by non-sleepable program or sleepable program. However bpf_map_fd_put_ptr() decreases the ref-counter of the inner map directly through bpf_map_put(), if the ref-counter is the last one (which is true for most cases), the inner map will be freed by ops-\u003emap_free() in a kworker. But for now, most .map_free() callbacks don\u0027t use synchronize_rcu() or its variants to wait for the elapse of a RCU grace period, so after the invocation of ops-\u003emap_free completes, the bpf program which is accessing the inner map may incur use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-52447"
},
{
"cve": "CVE-2023-52458",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock: add check that partition length needs to be aligned with block size",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-52458"
},
{
"cve": "CVE-2023-52614",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nPM / devfreq: Fix buffer overflow in trans_stat_show",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-52614"
},
{
"cve": "CVE-2023-52620",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: disallow timeout for anonymous sets\r\n\r\nNever used from userspace, disallow these parameters.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-52620"
},
{
"cve": "CVE-2024-0584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0584"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions. An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Use of the low-level GF(2m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named curves\" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2m)) curves that can\u0027t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an \"exotic\" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with \"exotic\" explicit binary (GF(2m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-22099",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.\n\nThis issue affects Linux kernel: v2.6.12-rc2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-22099"
},
{
"cve": "CVE-2024-23307",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-23307"
},
{
"cve": "CVE-2024-23848",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-23848"
},
{
"cve": "CVE-2024-24857",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s net/bluetooth device driver in conn_info_{min,max}_age_set() function. This can result in integrity overflow issue, possibly leading to bluetooth connection abnormality or denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-24857"
},
{
"cve": "CVE-2024-24858",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s net/bluetooth in {conn,adv}_{min,max}_interval_set() function. This can result in I2cap connection or broadcast abnormality issue, possibly leading to denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-24858"
},
{
"cve": "CVE-2024-24859",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s net/bluetooth in sniff_{min,max}_interval_set() function. This can result in a bluetooth sniffing exception issue, possibly leading denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-24859"
},
{
"cve": "CVE-2024-25739",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt to allocate zero bytes, and crash, because of a missing check for ubi-\u003eleb_size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-25739"
},
{
"cve": "CVE-2024-26629",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"notes": [
{
"category": "summary",
"text": "nfsd: The test on so_count in nfsd4_release_lockowner() is potentially harmful. It can transiently return a false positive resulting in a return of NFS4ERR_LOCKS_HELD when in fact no locks are held. This is clearly a protocol violation and with the Linux NFS client it can cause incorrect behaviour.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26629"
},
{
"cve": "CVE-2024-26642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: disallow anonymous set with timeout flag",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26642"
},
{
"cve": "CVE-2024-26643",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26643"
},
{
"cve": "CVE-2024-26651",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "sr9800: Local Denial of Service Vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26651"
},
{
"cve": "CVE-2024-26659",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "xhci: isoc Babble and Buffer Overrun events are not handled properly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26659"
},
{
"cve": "CVE-2024-26787",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "mmc: mmci: stm32: Fixed issue with overlapping mappings in the DMA API.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26787"
},
{
"cve": "CVE-2024-26810",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nvfio/pci: Lock external INTx masking ops",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26810"
},
{
"cve": "CVE-2024-26812",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nvfio/pci: Create persistent INTx handler",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26812"
},
{
"cve": "CVE-2024-26816",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"notes": [
{
"category": "summary",
"text": "x86, relocs: relocations in .notes section. When building with CONFIG_XEN_PV=y, .text symbols are emitted into the .notes section so that Xen can find the \"startup_xen\" entry point.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26816"
},
{
"cve": "CVE-2024-26820",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26820"
},
{
"cve": "CVE-2024-26851",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: nf_conntrack_h323: Add protection for bmp length out of range.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26851"
},
{
"cve": "CVE-2024-26852",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/ipv6: possible UAF in ip6_route_mpath_notify().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26852"
},
{
"cve": "CVE-2024-26855",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26855"
},
{
"cve": "CVE-2024-26859",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/bnx2x: Race condition leading to system crash during EEH error handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26859"
},
{
"cve": "CVE-2024-26861",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wireguard: receive: data-race around receiving_counter.counter.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26861"
},
{
"cve": "CVE-2024-26863",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in hsr_get_node().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26863"
},
{
"cve": "CVE-2024-26870",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26870"
},
{
"cve": "CVE-2024-26872",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "RDMA/srpt: use-after-free Write in srpt_refresh_port().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26872"
},
{
"cve": "CVE-2024-26875",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "media: pvrusb2: fix uaf in pvr2_context_set_notify.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26875"
},
{
"cve": "CVE-2024-26877",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "crypto: xilinx - call finalize with bh disabled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26877"
},
{
"cve": "CVE-2024-26878",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: quota: Fix potential NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26878"
},
{
"cve": "CVE-2024-26880",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26880"
},
{
"cve": "CVE-2024-26882",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26882"
},
{
"cve": "CVE-2024-26883",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Fix stackmap overflow check on 32-bit arches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26883"
},
{
"cve": "CVE-2024-26884",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Fix hashtab overflow check on 32-bit arches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26884"
},
{
"cve": "CVE-2024-26885",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbpf: Fix DEVMAP_HASH overflow check on 32-bit arches\r\n\r\nThe devmap code allocates a number hash buckets equal to the next power\r\nof two of the max_entries value provided when creating the map. When\r\nrounding up to the next power of two, the 32-bit variable storing the\r\nnumber of buckets can overflow, and the code checks for overflow by\r\nchecking if the truncated 32-bit value is equal to 0. However, on 32-bit\r\narches the rounding up itself can overflow mid-way through, because it\r\nends up doing a left-shift of 32 bits on an unsigned long value. If the\r\nsize of an unsigned long is four bytes, this is undefined behaviour, so\r\nthere is no guarantee that we\u0027ll end up with a nice and tidy 0-value at\r\nthe end.\r\n\r\nSyzbot managed to turn this into a crash on arm32 by creating a\r\nDEVMAP_HASH with max_entries \u003e 0x80000000 and then trying to update it.\r\nFix this by moving the overflow check to before the rounding up\r\noperation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26885"
},
{
"cve": "CVE-2024-26889",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: hci_core: Fix possible buffer overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26889"
},
{
"cve": "CVE-2024-26891",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "iommu/vt-d: Don\u0027t issue ATS Invalidation request when device is disconnected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26891"
},
{
"cve": "CVE-2024-26894",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26894"
},
{
"cve": "CVE-2024-26895",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26895"
},
{
"cve": "CVE-2024-26897",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26897"
},
{
"cve": "CVE-2024-26898",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26898"
},
{
"cve": "CVE-2024-26901",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26901"
},
{
"cve": "CVE-2024-26903",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: rfcomm: Fixed null-ptr-deref in rfcomm_check_security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26903"
},
{
"cve": "CVE-2024-26906",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26906"
},
{
"cve": "CVE-2024-26907",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "RDMA/mlx5: Fixed fortify source warning while accessing Eth segment.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26907"
},
{
"cve": "CVE-2024-26920",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntracing/trigger: Fix to return error if failed to alloc snapshot",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26923",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26923"
},
{
"cve": "CVE-2024-26925",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The commit mutex should not be released during the critical section between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC worker could collect expired objects and get the released commit lock within the same GC sequence. nf_tables_module_autoload() temporarily releases the mutex to load module dependencies, then it goes back to replay the transaction again. Move it at the end of the abort phase after nft_gc_seq_end() is called.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-26934",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nUSB: core: Fix deadlock in usb_deauthorize_interface()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26934"
},
{
"cve": "CVE-2024-26935",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: core: Fix unremoved procfs host directory regression",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26935"
},
{
"cve": "CVE-2024-26937",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/i915/gt: Reset queue_priority_hint on parking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26937"
},
{
"cve": "CVE-2024-26950",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwireguard: netlink: access device through ctx instead of peer",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26950"
},
{
"cve": "CVE-2024-26951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwireguard: netlink: check for dangling peer via is_dead instead of empty list",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26951"
},
{
"cve": "CVE-2024-26958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfs: fix UAF in direct writes",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26960",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm: swap: fix race between free_swap_and_cache() and swapoff()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26960"
},
{
"cve": "CVE-2024-26961",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmac802154: fix llsec key resources release in mac802154_llsec_key_del",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26961"
},
{
"cve": "CVE-2024-26973",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: fat: fix uninitialized field in nostale filehandles When fat_encode_fh_nostale() encodes file handle without a parent it stores only first 10 bytes of the file handle. However the length of the file handle must be a multiple of 4 so the file handle is actually 12 bytes long and the last two bytes remain uninitialized. This is not great at we potentially leak uninitialized information with the handle to userspace. Properly initialize the full handle length.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26973"
},
{
"cve": "CVE-2024-26974",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncrypto: qat - resolve race condition during AER recovery",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26974"
},
{
"cve": "CVE-2024-26982",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\nSquashfs: check the inode number is not the invalid value of zero",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26982"
},
{
"cve": "CVE-2024-26988",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninit/main.c: Fix potential static_command_line memory overflow",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26988"
},
{
"cve": "CVE-2024-26993",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs: sysfs: Fix reference leak in sysfs_break_active_protection()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26993"
},
{
"cve": "CVE-2024-27004",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: Get runtime PM before walking tree during disable_unused",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27004"
},
{
"cve": "CVE-2024-27013",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntun: limit printing rate when illegal packet received by tun dev\r\n\r\nvhost_worker will call tun call backs to receive packets. If too many\r\nillegal packets arrives, tun_do_read will keep dumping packet contents.\r\nWhen console is enabled, it will costs much more cpu time to dump\r\npacket and soft lockup will be detected.\r\n\r\nnet_ratelimit mechanism can be used to limit the dumping rate.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27013"
},
{
"cve": "CVE-2024-27020",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in nft_expr_type_get().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27020"
},
{
"cve": "CVE-2024-27024",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Linux kernel: net/rds: WARNING in rds_conn_connect_if_down If connection isn\u0027t established yet, get_mr() will fail, trigger connection after get_mr().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27024"
},
{
"cve": "CVE-2024-27025",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: nbd: null check for nla_nest_start nla_nest_start() may fail and return NULL. Insert a check and set errno based on other call sites within the same source code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27025"
},
{
"cve": "CVE-2024-27038",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: clk: clk_core_get NULL dereference It is possible for clk_core_get to dereference a NULL in the following sequence: clk_core_get() of_clk_get_hw_from_clkspec() __of_clk_get_hw_from_provider() __clk_get_hw() __clk_get_hw() can return NULL which is dereferenced by clk_core_get() at hw-\u003ecore. Prior to commit dde4eff47c82 (\"clk: Look for parents with clkdev based clk_lookups\") the check IS_ERR_OR_NULL() was performed which would have caught the NULL. Reading the description of this function it talks about returning NULL but that cannot be so at the moment. Update the function to check for hw before dereferencing it and return NULL if hw is NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27038"
},
{
"cve": "CVE-2024-27047",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerablity in Linux kernel: net: phy: phy_get_internal_delay accessing an empty array The phy_get_internal_delay function could try to access to an empty array in the case that the driver is calling phy_get_internal_delay without defining delay_values and rx-internal-delay-ps or tx-internal-delay-ps is defined to 0 in the device-tree. This will lead to \"unable to handle kernel NULL pointer dereference at virtual address 0\".",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27047"
},
{
"cve": "CVE-2024-27052",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work The workqueue might still be running, when the driver is stopped.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27052"
},
{
"cve": "CVE-2024-27053",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Linux kernel: wifi: wilc1000: RCU usage in connect path",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27053"
},
{
"cve": "CVE-2024-27059",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands. The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0. While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device\u0027s ID\ninformation is 0. This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27059"
},
{
"cve": "CVE-2024-27065",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not compare internal table flags on updates Restore skipping transaction if table update does not modify flags.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27065"
},
{
"cve": "CVE-2024-27072",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: usbtv: Remove useless locks in usbtv_video_free()\r\n\r\nRemove locks calls in usbtv_video_free() because\r\nare useless and may led to a deadlock as reported here:\r\nhttps://syzkaller.appspot.com/x/bisect.txt?x=166dc872180000\r\nAlso remove usbtv_stop() call since it will be called when\r\nunregistering the device.\r\n\r\nBefore \u0027c838530d230b\u0027 this issue would only be noticed if you\r\ndisconnect while streaming and now it is noticeable even when\r\ndisconnecting while not streaming.\r\n\r\n\r\n[hverkuil: fix minor spelling mistake in log message]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27072"
},
{
"cve": "CVE-2024-27076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Linux kernel: media: imx: csc/scaler: v4l2_ctrl_handler memory leak Free the memory allocated in v4l2_ctrl_handler_init on release.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27076"
},
{
"cve": "CVE-2024-27077",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: media: v4l2-mem2mem: a memleak in v4l2_m2m_register_entity The entity-\u003ename (i.e. name) is allocated in v4l2_m2m_register_entity but isn\u0027t freed in its following error-handling paths. This patch adds such deallocation to prevent memleak of entity-\u003ename.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27077"
},
{
"cve": "CVE-2024-27078",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: media: v4l2-tpg: some memleaks in tpg_alloc In tpg_alloc, resources should be deallocated in each and every error-handling paths, since they are allocated in for statements. Otherwise there would be memleaks because tpg_free is called only when tpg_alloc return 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27078"
},
{
"cve": "CVE-2024-27395",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: Fix Use-After-Free in ovs_ct_exit\n\nSince kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof ovs_ct_limit_exit, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27395"
},
{
"cve": "CVE-2024-27396",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27397",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: use timestamp to check for set element timeout\r\n\r\nAdd a timestamp field at the beginning of the transaction, store it\r\nin the nftables per-netns area.\r\n\r\nUpdate set backend .insert, .deactivate and sync gc path to use the\r\ntimestamp, this avoids that an element expires while control plane\r\ntransaction is still unfinished.\r\n\r\n.lookup and .update, which are used from packet path, still use the\r\ncurrent time to check if the element has expired. And .get path and dump\r\nalso since this runs lockless under rcu read size lock. Then, there is\r\nasync gc which also needs to check the current time since it runs\r\nasynchronously from a workqueue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27397"
},
{
"cve": "CVE-2024-27419",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netrom: data-races around sysctl_net_busy_read We need to protect the reader reading the sysctl value because the value can be changed concurrently.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27419"
},
{
"cve": "CVE-2024-27431",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program When running an XDP program that is attached to a cpumap entry, we don\u0027t initialise the xdp_rxq_info data structure being used in the xdp_buff that backs the XDP program invocation. Tobias noticed that this leads to random values being returned as the xdp_md-\u003erx_queue_index value for XDP programs running in a cpumap. This means we\u0027re basically returning the contents of the uninitialised memory, which is bad. Fix this by zero-initialising the rxq data structure before running the XDP program.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27431"
},
{
"cve": "CVE-2024-27436",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Stop parsing channels bits when all channels are found. If a usb audio device sets more bits than the amount of channels it could write outside of the map array.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27436"
},
{
"cve": "CVE-2024-27437",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Disable auto-enable of exclusive INTx IRQ\n\nCurrently for devices requiring masking at the irqchip for INTx, ie.\ndevices without DisINTx support, the IRQ is enabled in request_irq()\nand subsequently disabled as necessary to align with the masked status\nflag. This presents a window where the interrupt could fire between\nthese events, resulting in the IRQ incrementing the disable depth twice.\nThis would be unrecoverable for a user since the masked flag prevents\nnested enables through vfio.\n\nInstead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx\nis never auto-enabled, then unmask as required.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27437"
},
{
"cve": "CVE-2024-33621",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipvlan: Dont Use skb-\u003esk in ipvlan_process_v4 / 6_outbound.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-33621"
},
{
"cve": "CVE-2024-33847",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "f2fs: compress: Released compress inode f2fs image may be corrupted. The reason is partial truncation assume compressed inode has reserved blocks, after partial truncation, valid block count may change w/o .i_blocks and .total_valid_block_count update, resulting in corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-33847"
},
{
"cve": "CVE-2024-34027",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "f2fs: compress: filesystem metadata including blkaddr in dnode, inode fields and .total_valid_block_count may be corrupted after SPO case.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-34027"
},
{
"cve": "CVE-2024-35789",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\r\n\r\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\r\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\r\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\r\nafter the VLAN change.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35805",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndm snapshot: fix lockup in dm_exception_table_exit\r\n\r\nThere was reported lockup when we exit a snapshot with many exceptions.\r\nFix this by adding \"cond_resched\" to the loop that frees the exceptions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35805"
},
{
"cve": "CVE-2024-35807",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35807"
},
{
"cve": "CVE-2024-35811",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35811"
},
{
"cve": "CVE-2024-35813",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmmc: core: Avoid negative index with array access\r\n\r\nCommit 4d0c8d0aef63 (\"mmc: core: Use mrq.sbc in close-ended ffu\") assigns\r\nprev_idata = idatas[i - 1], but doesn\u0027t check that the iterator i is\r\ngreater than zero. Let\u0027s fix this by adding a check.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35813"
},
{
"cve": "CVE-2024-35815",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion\r\n\r\nThe first kiocb_set_cancel_fn() argument may point at a struct kiocb\r\nthat is not embedded inside struct aio_kiocb. With the current code,\r\ndepending on the compiler, the req-\u003eki_ctx read happens either before\r\nthe IOCB_AIO_RW test or after that test. Move the req-\u003eki_ctx read such\r\nthat it is guaranteed that the IOCB_AIO_RW test happens first.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35815"
},
{
"cve": "CVE-2024-35823",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nvt: fix unicode buffer corruption when deleting characters\r\n\r\nThis is the same issue that was fixed for the VGA text buffer in commit\r\n39cdb68c64d8 (\"vt: fix memory overlapping when deleting chars in the\r\nbuffer\"). The cure is also the same i.e. replace memcpy() with memmove()\r\ndue to the overlaping buffers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35823"
},
{
"cve": "CVE-2024-35828",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: some memleaks in lbs_allocate_cmd_buffer() In the for statement of lbs_allocate_cmd_buffer(), if the allocation of cmdarray[i].cmdbuf fails, both cmdarray and cmdarray[i].cmdbuf needs to be freed. Otherwise, there will be memleaks in lbs_allocate_cmd_buffer().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35828"
},
{
"cve": "CVE-2024-35845",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: iwlwifi: dbg-tlv: ensure NUL termination The iwl_fw_ini_debug_info_tlv is used as a string, so we must ensure the string is terminated correctly before using it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35845"
},
{
"cve": "CVE-2024-35849",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: fix information leak in btrfs_ioctl_logical_to_ino()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35849"
},
{
"cve": "CVE-2024-35877",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/mm/pat: fix VM_PAT handling in COW mappings\r\n\r\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\r\nin fact, all PTEs) can be replaced during write faults to point at anon\r\nfolios. Reliably recovering the correct PFN and cachemode using\r\nfollow_phys() from PTEs will not work in COW mappings.\r\n\r\nUsing follow_phys(), we might just get the address+protection of the anon\r\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\r\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\r\ntrack_pfn_copy(), not properly calling free_pfn_range().\r\n\r\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\r\nit with the wrong range, possibly leaking memory.\r\n\r\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\r\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\r\nif we run into that.\r\n\r\nWe will now properly handle untrack_pfn() with COW mappings, where we\r\ndon\u0027t need the cachemode. We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\r\nthe first page was replaced by an anon folio, though: we\u0027d have to store\r\nthe cachemode in the VMA to make this work, likely growing the VMA size.\r\n\r\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\r\ncase: it would have failed in the past with swap/nonswap entries already,\r\nand it would have done the wrong thing with anon folios.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35877"
},
{
"cve": "CVE-2024-35884",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nudp: do not accept non-tunnel GSO skbs landing in a tunnel\r\n\r\nWhen rx-udp-gro-forwarding is enabled UDP packets might be GROed when\r\nbeing forwarded. If such packets might land in a tunnel this can cause\r\nvarious issues and udp_gro_receive makes sure this isn\u0027t the case by\r\nlooking for a matching socket. This is performed in\r\nudp4/6_gro_lookup_skb but only in the current netns. This is an issue\r\nwith tunneled packets when the endpoint is in another netns. In such\r\ncases the packets will be GROed at the UDP level, which leads to various\r\nissues later on. The same thing can happen with rx-gro-list.\r\n\r\nWe saw this with geneve packets being GROed at the UDP level. In such\r\ncase gso_size is set; later the packet goes through the geneve rx path,\r\nthe geneve header is pulled, the offset are adjusted and frag_list skbs\r\nare not adjusted with regard to geneve. When those skbs hit\r\nskb_fragment, it will misbehave. Different outcomes are possible\r\ndepending on what the GROed skbs look like; from corrupted packets to\r\nkernel crashes.\r\n\r\nOne example is a BUG_ON[1] triggered in skb_segment while processing the\r\nfrag_list. Because gso_size is wrong (geneve header was pulled)\r\nskb_segment thinks there is \"geneve header size\" of data in frag_list,\r\nalthough it\u0027s in fact the next packet. The BUG_ON itself has nothing to\r\ndo with the issue. This is only one of the potential issues.\r\n\r\nLooking up for a matching socket in udp_gro_receive is fragile: the\r\nlookup could be extended to all netns (not speaking about performances)\r\nbut nothing prevents those packets from being modified in between and we\r\ncould still not find a matching socket. It\u0027s OK to keep the current\r\nlogic there as it should cover most cases but we also need to make sure\r\nwe handle tunnel packets being GROed too early.\r\n\r\nThis is done by extending the checks in udp_unexpected_gso: GSO packets\r\nlacking the SKB_GSO_UDP_TUNNEL/_CSUM bits and landing in a tunnel must\r\nbe segmented.\r\n\r\n[1] kernel BUG at net/core/skbuff.c:4408!\r\n RIP: 0010:skb_segment+0xd2a/0xf70\r\n __udp_gso_segment+0xaa/0x560",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35884"
},
{
"cve": "CVE-2024-35886",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: Fix infinite recursion in fib6_dump_done().\r\n\r\nsyzkaller reported infinite recursive calls of fib6_dump_done() during\r\nnetlink socket destruction.\r\n\r\nFrom the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then\r\nthe response was generated. The following recvmmsg() resumed the dump\r\nfor IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due\r\nto the fault injection.\r\n\r\n 12:01:34 executing program 3:\r\n r0 = socket$nl_route(0x10, 0x3, 0x0)\r\n sendmsg$nl_route(r0, ... snip ...)\r\n recvmmsg(r0, ... snip ...) (fail_nth: 8)\r\n\r\nHere, fib6_dump_done() was set to nlk_sk(sk)-\u003ecb.done, and the next call\r\nof inet6_dump_fib() set it to nlk_sk(sk)-\u003ecb.args[3]. syzkaller stopped\r\nreceiving the response halfway through, and finally netlink_sock_destruct()\r\ncalled nlk_sk(sk)-\u003ecb.done().\r\n\r\nfib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)-\u003ecb.done() if it\r\nis still not NULL. fib6_dump_end() rewrites nlk_sk(sk)-\u003ecb.done() by\r\nnlk_sk(sk)-\u003ecb.args[3], but it has the same function, not NULL, calling\r\nitself recursively and hitting the stack guard page.\r\n\r\nTo avoid the issue, let\u0027s set the destructor after kzalloc().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35886"
},
{
"cve": "CVE-2024-35888",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: erspan: make sure erspan_base_hdr is present in skb-\u003ehead.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35888"
},
{
"cve": "CVE-2024-35893",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/sched: act_skbmod: prevent kernel-infoleak\r\n\r\nsyzbot found that tcf_skbmod_dump() was copying four bytes\r\nfrom kernel stack to user space.\r\n\r\nThe issue here is that \u0027struct tc_skbmod\u0027 has a four bytes hole.\r\n\r\nWe need to clear the structure before filling fields.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35893"
},
{
"cve": "CVE-2024-35895",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n CPU0 CPU1\n ---- ----\n lock(\u0026htab-\u003ebuckets[i].lock);\n local_irq_disable();\n lock(\u0026host-\u003elock);\n lock(\u0026htab-\u003ebuckets[i].lock);\n \u003cInterrupt\u003e\n lock(\u0026host-\u003elock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35895"
},
{
"cve": "CVE-2024-35896",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: validate user input for expected length\r\n\r\nI got multiple syzbot reports showing old bugs exposed\r\nby BPF after commit 20f2505fb436 (\"bpf: Try to avoid kzalloc\r\nin cgroup/{s,g}etsockopt\")\r\n\r\nsetsockopt() @optlen argument should be taken into account\r\nbefore copying data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35896"
},
{
"cve": "CVE-2024-35897",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: discard table flag update with pending basechain deletion\r\n\r\nHook unregistration is deferred to the commit phase, same occurs with\r\nhook updates triggered by the table dormant flag. When both commands are\r\ncombined, this results in deleting a basechain while leaving its hook\r\nstill registered in the core.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35897"
},
{
"cve": "CVE-2024-35898",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()\r\n\r\nnft_unregister_flowtable_type() within nf_flow_inet_module_exit() can\r\nconcurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().\r\nAnd thhere is not any protection when iterate over nf_tables_flowtables\r\nlist in __nft_flowtable_type_get(). Therefore, there is pertential\r\ndata-race of nf_tables_flowtables list entry.\r\n\r\nUse list_for_each_entry_rcu() to iterate over nf_tables_flowtables list\r\nin __nft_flowtable_type_get(), and use rcu_read_lock() in the caller\r\nnft_flowtable_type_get() to protect the entire type query process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35898"
},
{
"cve": "CVE-2024-35899",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: flush pending destroy work before exit_net release\r\n\r\nSimilar to 2c9f0293280e (\"netfilter: nf_tables: flush pending destroy\r\nwork before netlink notifier\") to address a race between exit_net and\r\nthe destroy workqueue.\r\n\r\nThe trace below shows an element to be released via destroy workqueue\r\nwhile exit_net path (triggered via module removal) has already released\r\nthe set that is used in such transaction.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35899"
},
{
"cve": "CVE-2024-35900",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: reject new basechain after table flag update\r\n\r\nWhen dormant flag is toggled, hooks are disabled in the commit phase by\r\niterating over current chains in table (existing and new).\r\n\r\nThe following configuration allows for an inconsistent state:\r\n\r\n add table x\r\n add chain x y { type filter hook input priority 0; }\r\n add table x { flags dormant; }\r\n add chain x w { type filter hook input priority 1; }\r\n\r\nwhich triggers the following warning when trying to unregister chain w\r\nwhich is already unregistered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35900"
},
{
"cve": "CVE-2024-35902",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/rds: possible cp null dereference cp might be null, calling cp-\u003ecp_conn would produce null dereference. Cp is a parameter of __rds_rdma_map and is not reassigned.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35902"
},
{
"cve": "CVE-2024-35905",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Protect against int overflow for stack access size\n\nThis patch re-introduces protection against the size of access to stack\nmemory being negative; the access size can appear negative as a result\nof overflowing its signed int representation. This should not actually\nhappen, as there are other protections along the way, but we should\nprotect against it anyway. One code path was missing such protections\n(fixed in the previous patch in the series), causing out-of-bounds array\naccesses in check_stack_range_initialized(). This patch causes the\nverification of a program with such a non-sensical access size to fail.\n\nThis check used to exist in a more indirect way, but was inadvertendly\nremoved in a833a17aeac7.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35905"
},
{
"cve": "CVE-2024-35910",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets We had various syzbot reports about tcp timers firing after the corresponding netns has been dismantled. Fortunately Josef Bacik could trigger the issue more often, and could test a patch I wrote two years ago. When TCP sockets are closed, we call inet_csk_clear_xmit_timers() to \u0027stop\u0027 the timers. inet_csk_clear_xmit_timers() can be called from any context, including when socket lock is held. This is the reason it uses sk_stop_timer(), aka del_timer(). This means that ongoing timers might finish much later. For user sockets, this is fine because each running timer holds a reference on the socket, and the user socket holds a reference on the netns. For kernel sockets, we risk that the netns is freed before timer can complete, because kernel sockets do not hold reference on the netns. This patch adds inet_csk_clear_xmit_timers_sync() function that using sk_stop_timer_sync() to make sure all timers are terminated before the kernel socket is released. Modules using kernel sockets close them in their netns exit() handler. Also add sock_not_owned_by_me() helper to get LOCKDEP support : inet_csk_clear_xmit_timers_sync() must not be called while socket lock is held. It is very possible we can revert in the future commit 3a58f13a881e (\"net: rds: acquire refcount on TCP sockets\") which attempted to solve the issue in rds only. (net/smc/af_smc.c and net/mptcp/subflow.c have similar code) We probably can remove the check_net() tests from tcp_out_of_resources() and __tcp_close() in the future.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35910"
},
{
"cve": "CVE-2024-35915",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35915"
},
{
"cve": "CVE-2024-35922",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "fbmon: prevent division by zero in fb_videomode_from_videomode()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35922"
},
{
"cve": "CVE-2024-35925",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "block: prevent division by zero in blk_rq_stat_sum()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35925"
},
{
"cve": "CVE-2024-35930",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35930"
},
{
"cve": "CVE-2024-35933",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: btintel: Fix null ptr deref in btintel_read_version",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35933"
},
{
"cve": "CVE-2024-35934",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35934"
},
{
"cve": "CVE-2024-35935",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "btrfs: send: handle path ref underflow in header iterate_inode_ref()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35935"
},
{
"cve": "CVE-2024-35936",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35936"
},
{
"cve": "CVE-2024-35940",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "pstore/zone: Add a null pointer check to the psz_kmsg_read",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35940"
},
{
"cve": "CVE-2024-35944",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35944"
},
{
"cve": "CVE-2024-35950",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "drm/client: Fully protect modes with dev-\u003emode_config.mutex",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35950"
},
{
"cve": "CVE-2024-35955",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "kprobes: Fix possible use-after-free issue on kprobe registration",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net: ena: Fix incorrect descriptor free behavior",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35958"
},
{
"cve": "CVE-2024-35960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "net/mlx5: Properly link new fs rules into the tree",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35960"
},
{
"cve": "CVE-2024-35962",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "summary",
"text": "netfilter: complete validation of user input",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35962"
},
{
"cve": "CVE-2024-35965",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: L2CAP: Fix not validating setsockopt user input\r\n\r\nCheck user input length before copying data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35965"
},
{
"cve": "CVE-2024-35966",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: RFCOMM: Fix not validating setsockopt user input",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35966"
},
{
"cve": "CVE-2024-35967",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: SCO: Fix not validating setsockopt user input",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35967"
},
{
"cve": "CVE-2024-35969",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35973",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "geneve: fix header validation in geneve_xmit_skb",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35973"
},
{
"cve": "CVE-2024-35976",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "xsk: validate user input for XDP_UMEM|COMPLETION_FILL_RING",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35976"
},
{
"cve": "CVE-2024-35978",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: Fix memory leak in hci_req_sync_complete()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35978"
},
{
"cve": "CVE-2024-35982",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "batman-adv: Avoid infinite loop trying to resize local TT",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35982"
},
{
"cve": "CVE-2024-35983",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35983"
},
{
"cve": "CVE-2024-35984",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "i2c: smbus: fix NULL function pointer dereference",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35984"
},
{
"cve": "CVE-2024-35988",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "riscv: Fix TASK_SIZE on 64-bit NOMMU. On NOMMU, userspace memory can come from anywhere in physical RAM. The current definition of TASK_SIZE is wrong if any RAM exists above 4G,\r\ncausing spurious failures in the userspace access routines.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35988"
},
{
"cve": "CVE-2024-35990",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "dma: xilinx_dpdma: Fix locking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35990"
},
{
"cve": "CVE-2024-35996",
"cwe": {
"id": "CWE-655",
"name": "Insufficient Psychological Acceptability"
},
"notes": [
{
"category": "summary",
"text": "cpu: Re-enable CPU mitigations by default for !X86 architectures",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35996"
},
{
"cve": "CVE-2024-35997",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35997"
},
{
"cve": "CVE-2024-36004",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "i40e: Do not use WQ_MEM_RECLAIM flag for workqueue",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36004"
},
{
"cve": "CVE-2024-36005",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: nf_tables: honor table dormant flag from netdev release event path",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36005"
},
{
"cve": "CVE-2024-36006",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmlxsw: spectrum_acl_tcam: Fix incorrect list API usage",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36006"
},
{
"cve": "CVE-2024-36007",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmlxsw: spectrum_acl_tcam: Fix warning during rehash\r\n\r\nAs previously explained, the rehash delayed work migrates filters from\r\none region to another. This is done by iterating over all chunks (all\r\nthe filters with the same priority) in the region and in each chunk\r\niterating over all the filters.\r\n\r\nWhen the work runs out of credits it stores the current chunk and entry\r\nas markers in the per-work context so that it would know where to resume\r\nthe migration from the next time the work is scheduled.\r\n\r\nUpon error, the chunk marker is reset to NULL, but without resetting the\r\nentry markers despite being relative to it. This can result in migration\r\nbeing resumed from an entry that does not belong to the chunk being\r\nmigrated. In turn, this will eventually lead to a chunk being iterated\r\nover as if it is an entry. Because of how the two structures happen to\r\nbe defined, this does not lead to KASAN splats, but to warnings such as.\r\n\r\nFix by creating a helper that resets all the markers and call it from\r\nall the places the currently only reset the chunk marker. For good\r\nmeasures also call it when starting a completely new rehash. Add a\r\nwarning to avoid future cases.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36007"
},
{
"cve": "CVE-2024-36008",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv4: check for NULL idev in ip_route_use_hint()\r\n\r\nsyzbot was able to trigger a NULL deref in fib_validate_source()\r\nin an old tree.\r\n\r\nIt appears the bug exists in latest trees.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36008"
},
{
"cve": "CVE-2024-36020",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni40e: fix vf may be used uninitialized in this function warning\r\n\r\nTo fix the regression introduced by commit 52424f974bc5, which causes\r\nservers hang in very hard to reproduce conditions with resets races.\r\nUsing two sources for the information is the root cause.\r\nIn this function before the fix bumping v didn\u0027t mean bumping vf\r\npointer. But the code used this variables interchangeably, so stale vf\r\ncould point to different/not intended vf.\r\n\r\nRemove redundant \"v\" variable and iterate via single VF pointer across\r\nwhole function instead to guarantee VF pointer validity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36020"
},
{
"cve": "CVE-2024-36270",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: tproxy: bail out if IP has been disabled on the device syzbot reports: general protection fault, probably for non-canonical address",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36270"
},
{
"cve": "CVE-2024-36286",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36286"
},
{
"cve": "CVE-2024-36288",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token-\u003epages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f].",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36288"
},
{
"cve": "CVE-2024-36484",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36484"
},
{
"cve": "CVE-2024-36489",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tls: missing memory barrier in tls_init. In tls_init(), a write memory barrier is missing, and store-store reordering may cause NULL dereference in tls_{setsockopt,getsockopt}.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36489"
},
{
"cve": "CVE-2024-36894",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36894"
},
{
"cve": "CVE-2024-36899",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngpiolib: cdev: Fix use after free in lineinfo_changed_notify\r\n\r\nThe use-after-free issue occurs as follows: when the GPIO chip device file\r\nis being closed by invoking gpio_chrdev_release(), watched_lines is freed\r\nby bitmap_free(), but the unregistration of lineinfo_changed_nb notifier\r\nchain failed due to waiting write rwsem. Additionally, one of the GPIO\r\nchip\u0027s lines is also in the release process and holds the notifier chain\u0027s\r\nread rwsem. Consequently, a race condition leads to the use-after-free of\r\nwatched_lines.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36899"
},
{
"cve": "CVE-2024-36902",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() syzbot is able to trigger the following crash [1], caused by unsafe ip6_dst_idev() use. Indeed ip6_dst_idev() can return NULL, and must always be checked.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36902"
},
{
"cve": "CVE-2024-36904",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36905",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36905"
},
{
"cve": "CVE-2024-36916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: blk-iocost: avoid out of bounds shift UBSAN catches undefined behavior in blk-iocost, where sometimes iocg-\u003edelay is shifted right by a number that is too large, resulting in undefined behavior on some architectures. [ 186.556576] ------------[ cut here ]------------ UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23 shift exponent 64 is too large for 64-bit type \u0027u64\u0027 (aka \u0027unsigned long long\u0027) CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S E N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1 Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020 Call Trace: \u003cIRQ\u003e dump_stack_lvl+0x8f/0xe0 __ubsan_handle_shift_out_of_bounds+0x22c/0x280 iocg_kick_delay+0x30b/0x310 ioc_timer_fn+0x2fb/0x1f80 __run_timer_base+0x1b6/0x250 ... Avoid that undefined behavior by simply taking the \"delay = 0\" branch if the shift is too large. I am not sure what the symptoms of an undefined value delay will be, but I suspect it could be more than a little annoying to debug.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36916"
},
{
"cve": "CVE-2024-36929",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: core: reject skb_copy(_expand) for fraglist GSO skbs SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become invalid. Return NULL if such an skb is passed to skb_copy or skb_copy_expand, in order to prevent a crash on a potential later call to skb_gso_segment.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36929"
},
{
"cve": "CVE-2024-36939",
"cwe": {
"id": "CWE-391",
"name": "Unchecked Error Condition"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: nfs: Handle error of rpc_proc_register() in nfs_net_init(). syzkaller reported a warning [0] triggered while destroying immature netns. rpc_proc_register() was called in init_nfs_fs(), but its error has been ignored since at least the initial commit 1da177e4c3f4 (\"Linux-2.6.12-rc2\"). Recently, commit d47151b79e32 (\"nfs: expose /proc/net/sunrpc/nfs in net namespaces\") converted the procfs to per-netns and made the problem more visible. Even when rpc_proc_register() fails, nfs_net_init() could succeed, and thus nfs_net_exit() will be called while destroying the netns. Then, remove_proc_entry() will be called for non-existing proc directory and trigger the warning below. Let\u0027s handle the error of rpc_proc_register() properly in nfs_net_init(). [0]: name \u0027nfs\u0027 WARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711 Modules linked in: CPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 RIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711 Code: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff \u003c0f\u003e 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb RSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286 RAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c RDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc R13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8 FS: 00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: \u003cTASK\u003e rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310 nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438 ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170 setup_net+0x46c/0x660 net/core/net_namespace.c:372 copy_net_ns+0x244/0x590 net/core/net_namespace.c:505 create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110 unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228 ksys_unshare+0x342/0x760 kernel/fork.c:3322 __do_sys_unshare kernel/fork.c:3393 [inline] __se_sys_unshare kernel/fork.c:3391 [inline] __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x46/0x4e RIP: 0033:0x7f30d0febe5d Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48 RSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600 RBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000 \u003c/TASK\u003e",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36939"
},
{
"cve": "CVE-2024-36940",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: pinctrl: core: delete incorrect free in pinctrl_enable() The \"pctldev\" struct is allocated in devm_pinctrl_register_and_init(). It\u0027s a devm_ managed pointer that is freed by devm_pinctrl_dev_release(), so freeing it in pinctrl_enable() will lead to a double free. The devm_pinctrl_dev_release() function frees the pindescs and destroys the mutex as well.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36959",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() If we fail to allocate propname buffer, we need to drop the reference count we just took. Because the pinctrl_dt_free_maps() includes the droping operation, here we call it directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36959"
},
{
"cve": "CVE-2024-36974",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP. If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev-\u003enum_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36974"
},
{
"cve": "CVE-2024-36978",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: sched: sch_multiq: possible OOB write in multiq_tune() q-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic after kmalloc. So the old q-\u003ebands should not be used in kmalloc. Otherwise, an out-of-bounds write will occur.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36978"
},
{
"cve": "CVE-2024-37356",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-37356"
},
{
"cve": "CVE-2024-38381",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfc: nci: Fix uninit-value in nci_rx_work syzbot reported the following uninit-value access issue [1] nci_rx_work() parses received packet from ndev-\u003erx_q. It should be validated header size, payload size and total packet size before processing the packet. If an invalid packet is detected, it should be silently discarded.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38381"
},
{
"cve": "CVE-2024-38547",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "media: atomisp: ssh_css: null-pointer dereference in load_video_binaries.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38547"
},
{
"cve": "CVE-2024-38552",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drm/amd/display: Fix potential index out of bounds in color transformation function Fixes index out of bounds issue in the color transformation function. The issue could occur when the index \u0027i\u0027 exceeds the number of transfer function points (TRANSFER_FUNC_POINTS). The fix adds a check to ensure \u0027i\u0027 is within bounds before accessing the transfer function points. If \u0027i\u0027 is out of bounds, an error message is logged and the function returns false to indicate an error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38552"
},
{
"cve": "CVE-2024-38558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: openvswitch: fix overwriting ct original tuple for ICMPv6 OVS_PACKET_CMD_EXECUTE has 3 main attributes: - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format. - OVS_PACKET_ATTR_PACKET - Binary packet content. - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet. OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure with the metadata like conntrack state, input port, recirculation id, etc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38558"
},
{
"cve": "CVE-2024-38559",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don\u0027t ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38559"
},
{
"cve": "CVE-2024-38560",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "scsi: bfa: Ensure the copied buf is NUL terminated Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from userspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t ensure that the string is terminated inside the buffer, this can lead to OOB read when using sscanf.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38560"
},
{
"cve": "CVE-2024-38565",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: ar5523: enable proper endpoint verification Syzkaller reports [1] hitting a warning about an endpoint in use not having an expected type to it. Fix the issue by checking for the existence of all proper endpoints with their according types intact. Sadly, this patch has not been tested on real hardware.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38565"
},
{
"cve": "CVE-2024-38567",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: carl9170: add a proper sanity check for endpoints Syzkaller reports [1] hitting a warning which is caused by presence of a wrong endpoint type at the URB sumbitting stage. While there was a check for a specific 4th endpoint, since it can switch types between bulk and interrupt, other endpoints are trusted implicitly. Similar warning is triggered in a couple of other syzbot issues [2].",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38567"
},
{
"cve": "CVE-2024-38578",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ecryptfs: Fix buffer size for tag 66 packet The \u0027TAG 66 Packet Format\u0027 description is missing the cipher code and checksum fields that are packed into the message packet. As a result, the buffer allocated for the packet is 3 bytes too small and write_tag_66_packet() will write up to 3 bytes past the end of the buffer. Fix this by increasing the size of the allocation so the whole packet will always fit in the buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38578"
},
{
"cve": "CVE-2024-38579",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38579"
},
{
"cve": "CVE-2024-38587",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nspeakup: Fix sizeof() vs ARRAY_SIZE() bug\r\n\r\nThe \"buf\" pointer is an array of u16 values. This code should be\r\nusing ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),\r\notherwise it can the still got out of bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38587"
},
{
"cve": "CVE-2024-38589",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netrom: fix possible dead-lock in nr_rt_ioctl() syzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1] Make sure we always acquire nr_node_list_lock before nr_node_lock(nr_node).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38589"
},
{
"cve": "CVE-2024-38596",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38596"
},
{
"cve": "CVE-2024-38598",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38599",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "jffs2: prevent xattr node from overflowing the eraseblock Add a check to make sure that the requested xattr node size is no larger than the eraseblock minus the cleanmarker. Unlike the usual inode nodes, the xattr nodes aren\u0027t split into parts and spread across multiple eraseblocks, which means that a xattr node must not occupy more than one eraseblock. If the requested xattr value is too large, the xattr node can spill onto the next eraseblock, overwriting the nodes and causing errors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38599"
},
{
"cve": "CVE-2024-38612",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn\u0027t called. This issue exist since commit 46738b1317e1 (\"ipv6: sr: add option to control lwtunnel support\"), and commit 5559cea2d5aa (\"ipv6: sr: fix possible use-after-free and null-ptr-deref\") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38612"
},
{
"cve": "CVE-2024-38615",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "cpufreq: exit() callback is optional The exit() callback is optional and shouldn\u0027t be called without checking a valid pointer first. Also, we must clear freq_table pointer even if the exit() callback isn\u0027t present.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38615"
},
{
"cve": "CVE-2024-38619",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb-storage: alauda: Check whether the media is initialized. The member \"uzonesize\" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38619"
},
{
"cve": "CVE-2024-38635",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "soundwire: cadence: invalid PDI offset.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38635"
},
{
"cve": "CVE-2024-38659",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "enic: Validate length of nl attributes in enic_set_vf_port enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE is of length PORT_PROFILE_MAX and that the nl attributes IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX. These attributes are validated (in the function do_setlink in rtnetlink.c) using the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE as NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and IFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation using the policy is for the max size of the attributes and not on exact size so the length of these attributes might be less than the sizes that enic_set_vf_port expects. This might cause an out of bands read access in the memcpys of the data of these attributes in enic_set_vf_port.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38659"
},
{
"cve": "CVE-2024-38662",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Allow delete from sockmap/sockhash only if update is allowed. We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule violation by performing a map_delete on a sockmap/sockhash. We don\u0027t intend to support this artificial use scenario. Extend the existing verifier allowed-program-type check for updating sockmap/sockhash to also cover deleting from a map. From now on only BPF programs which were previously allowed to update sockmap/sockhash can delete from these map types.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38662"
},
{
"cve": "CVE-2024-38780",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don\u0027t enable IRQ from sync_print_obj().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-38780"
},
{
"cve": "CVE-2024-39468",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "smb: client: Deadlock in smb2_find_smb_tcon().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-39468"
},
{
"cve": "CVE-2024-39482",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bcache: Variable length array abuse in btree_iter.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-39482"
},
{
"cve": "CVE-2024-39489",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix memleak in seg6_hmac_init_algo seg6_hmac_init_algo returns without cleaning up the previous allocations if one fails, so it\u0027s going to leak all that memory and the crypto tfms. Update seg6_hmac_exit to only free the memory when allocated, so we can reuse the code directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-39489"
},
{
"cve": "CVE-2024-39493",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - Fix ADF_DEV_RESET_SYNC memory leak\n\nUsing completion_done to determine whether the caller has gone\naway only works after a complete call. Furthermore it\u0027s still\npossible that the caller has not yet called wait_for_completion,\nresulting in another potential UAF.\n\nFix this by making the caller use cancel_work_sync and then freeing\nthe memory safely.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-39493"
},
{
"cve": "CVE-2024-39502",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ionic: use after netif_napi_del(). When queues are started, netif_napi_add() and napi_enable() are called. If there are 4 queues and only 3 queues are used for the current configuration, only 3 queues\u0027 napi should be registered and enabled. The ionic_qcq_enable() checks whether the .poll pointer is not NULL for enabling only the using queue\u0027 napi. Unused queues\u0027 napi will not be registered by netif_napi_add(), so the .poll pointer indicates NULL. But it couldn\u0027t distinguish whether the napi was unregistered or not because netif_napi_del() doesn\u0027t reset the .poll pointer to NULL. So, ionic_qcq_enable() calls napi_enable() for the queue, which was unregistered by netif_napi_del().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-39502"
},
{
"cve": "CVE-2024-39503",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "netfilter: ipset: race between namespace cleanup and gc in the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-39503"
},
{
"cve": "CVE-2024-39509",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "HID: core: remove unnecessary WARN_ON() in implement(). There is a warning in a call to implement() when trying to write a value into a field of smaller size in an output report. Since implement() already has a warn message printed out with the help of hid_warn() and value in question gets trimmed with: ... value \u0026= m; ... WARN_ON may be considered superfluous.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-39509"
},
{
"cve": "CVE-2024-40905",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipv6: possible race in __fib6_drop_pcpu_from().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40905"
},
{
"cve": "CVE-2024-40912",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: mac80211: deadlock in ieee80211_sta_ps_deliver_wakeup().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40912"
},
{
"cve": "CVE-2024-40916",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found When reading EDID fails and driver reports no modes available, the DRM core adds an artificial 1024x786 mode to the connector.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40916"
},
{
"cve": "CVE-2024-40934",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() Fix a memory leak on logi_dj_recv_send_report() error path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40934"
},
{
"cve": "CVE-2024-40941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "wifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation. In case the firmware sends a notification that claims it has more data than it has, it will read past that was allocated for the notification.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40941"
},
{
"cve": "CVE-2024-40942",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects The hwmp code use objects of type mesh_preq_queue, added to a list in ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath gets deleted, ex mesh interface is removed, the entries in that list will never get cleaned.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40942"
},
{
"cve": "CVE-2024-40945",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"notes": [
{
"category": "summary",
"text": "iommu: Return right value in iommu_sva_bind_device() iommu_sva_bind_device() should return either a sva bond handle or an ERR_PTR value in error cases. Existing drivers (idxd and uacce) only check the return value with IS_ERR(). This could potentially lead to a kernel NULL pointer dereference issue if the function returns NULL instead of an error pointer. In reality, this doesn\u0027t cause any problems because iommu_sva_bind_device() only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40945"
},
{
"cve": "CVE-2024-40958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40958"
},
{
"cve": "CVE-2024-40959",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40959"
},
{
"cve": "CVE-2024-40960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent possible NULL dereference in rt6_probe() syzbot caught a NULL dereference in rt6_probe() [1] Bail out if __in6_dev_get() returns NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40960"
},
{
"cve": "CVE-2024-40961",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent possible NULL deref in fib6_nh_init() syzbot reminds us that in6_dev_get() can return NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40961"
},
{
"cve": "CVE-2024-40971",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "f2fs: remove clear SB_INLINECRYPT flag in default_options In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set. If create new file or open file during this gap, these files will not use inlinecrypt. Worse case, it may lead to data corruption if wrappedkey_v0 is enable.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40971"
},
{
"cve": "CVE-2024-40978",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "scsi: qedi: crash while reading debugfs attribute. The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly on a __user pointer, which results into the crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40978"
},
{
"cve": "CVE-2024-40980",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drop_monitor: replace spin_lock by raw_spin_lock trace_drop_common() is called with preemption disabled, and it acquires a spin_lock. This is problematic for RT kernels because spin_locks are sleeping locks in this configuration, which causes the following splat.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40980"
},
{
"cve": "CVE-2024-40984",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ACPICA: Revert \"ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.\"",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40984"
},
{
"cve": "CVE-2024-40993",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: ipset: suspicious rcu_dereference_protected().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40993"
},
{
"cve": "CVE-2024-40995",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: act_api: possible infinite loop in tcf_idr_check_alloc().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40995"
},
{
"cve": "CVE-2024-41000",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "block/ioctl: prefer different overflow check Running syzkaller with the newly reintroduced signed integer overflow sanitizer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-41000"
},
{
"cve": "CVE-2024-41004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tracing: Build event generation tests only as modules The kprobes and synth event generation test modules add events and lock (get a reference) those event file reference in module init function, and unlock and delete it in module exit function. This is because those are designed for playing as modules. If we make those modules as built-in, those events are left locked in the kernel, and never be removed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-41004"
},
{
"cve": "CVE-2024-41005",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "netpoll: race condition in netpoll_owner_active KCSAN detected a race condition in netpoll.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-41005"
},
{
"cve": "CVE-2024-41006",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "netrom: a memory leak in nr_heartbeat_expiry().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-41006"
},
{
"cve": "CVE-2024-41016",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()\r\n\r\nxattr in ocfs2 maybe \u0027non-indexed\u0027, which saved with additional space requested. It\u0027s better to check if the memory is out of bound before memcmp, although this possibility mainly comes from crafted poisonous images.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-41016"
},
{
"cve": "CVE-2024-41996",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-41996"
},
{
"cve": "CVE-2024-42070",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42070"
},
{
"cve": "CVE-2024-42082",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "xdp: unused WARN() in __xdp_reg_mem_model().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42082"
},
{
"cve": "CVE-2024-42090",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "pinctrl: deadlock in create_pinctrl() when handling -EPROBE_DEFER. In create_pinctrl(), pinctrl_maps_mutex is acquired before calling add_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl() calls pinctrl_free(). However, pinctrl_free() attempts to acquire pinctrl_maps_mutex, which is already held by create_pinctrl(), leading to a potential deadlock.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42090"
},
{
"cve": "CVE-2024-42093",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/dpaa2: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42093"
},
{
"cve": "CVE-2024-42094",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/iucv: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42094"
},
{
"cve": "CVE-2024-42096",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: x86: stop playing stack games in profile_pc().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42096"
},
{
"cve": "CVE-2024-42097",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A missed validation vulnerability in the Linux Kernel\u0027s MIDI sequencer and router support functionality could allow a local user to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42097"
},
{
"cve": "CVE-2024-42114",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42114"
},
{
"cve": "CVE-2024-42259",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/i915/gem: Fix Virtual Memory mapping boundaries calculation\r\n\r\nCalculating the size of the mapped area as the lesser value\r\nbetween the requested size and the actual size does not consider\r\nthe partial mapping offset. This can cause page fault access.\r\n\r\nFix the calculation of the starting and ending addresses, the\r\ntotal size is now deduced from the difference between the end and\r\nstart addresses.\r\n\r\nAdditionally, the calculations have been rewritten in a clearer\r\nand more understandable form.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42259"
},
{
"cve": "CVE-2024-42265",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nprotect the fetch of -\u003efd[fd] in do_dup2() from mispredictions\r\n\r\nboth callers have verified that fd is not greater than -\u003emax_fds;\r\nhowever, misprediction might end up with\r\n tofree = fdt-\u003efd[fd];\r\nbeing speculatively executed. That\u0027s wrong for the same reasons\r\nwhy it\u0027s wrong in close_fd()/file_close_fd_locked(); the same\r\nsolution applies - array_index_nospec(fd, fdt-\u003emax_fds) could differ\r\nfrom fd only in case of speculative execution on mispredicted path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42265"
},
{
"cve": "CVE-2024-42272",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "sched: act_ct: take care of padding in struct zones_ht_key.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42272"
},
{
"cve": "CVE-2024-42276",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnvme-pci: add missing condition check for existence of mapped data\r\n\r\nnvme_map_data() is called when request has physical segments, hence\r\nthe nvme_unmap_data() should have same condition to avoid dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42276"
},
{
"cve": "CVE-2024-42281",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbpf: Fix a segment issue when downgrading gso_size\r\n\r\nLinearize the skb when downgrading gso_size because it may trigger a\r\nBUG_ON() later when the skb is segmented as described in [1,2].",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42281"
},
{
"cve": "CVE-2024-42283",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nexthop: Initialize all fields in dumped nexthops\n\nstruct nexthop_grp contains two reserved fields that are not initialized by\nnla_put_nh_group(), and carry garbage. This can be observed e.g. with\nstrace (edited for clarity):\n\n # ip nexthop add id 1 dev lo\n # ip nexthop add id 101 group 1\n # strace -e recvmsg ip nexthop get id 101\n ...\n recvmsg(... [{nla_len=12, nla_type=NHA_GROUP},\n [{id=1, weight=0, resvd1=0x69, resvd2=0x67}]] ...) = 52\n\nThe fields are reserved and therefore not currently used. But as they are, they\nleak kernel memory, and the fact they are not just zero complicates repurposing\nof the fields for new ends. Initialize the full structure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42283"
},
{
"cve": "CVE-2024-42292",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nkobject_uevent: Fix OOB access within zap_modalias_env()\r\n\r\nzap_modalias_env() wrongly calculates size of memory block to move, so\r\nwill cause OOB memory access issue if variable MODALIAS is not the last\r\none within its @env parameter, fixed by correcting size to memmove.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42292"
},
{
"cve": "CVE-2024-42302",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/DPC: Fix use-after-free on concurrent DPC and hot-removal\n\nKeith reports a use-after-free when a DPC event occurs concurrently to\nhot-removal of the same portion of the hierarchy:\n\nThe dpc_handler() awaits readiness of the secondary bus below the\nDownstream Port where the DPC event occurred. To do so, it polls the\nconfig space of the first child device on the secondary bus. If that\nchild device is concurrently removed, accesses to its struct pci_dev\ncause the kernel to oops.\n\nThat\u0027s because pci_bridge_wait_for_secondary_bus() neglects to hold a\nreference on the child device. Before v6.3, the function was only\ncalled on resume from system sleep or on runtime resume. Holding a\nreference wasn\u0027t necessary back then because the pciehp IRQ thread\ncould never run concurrently. (On resume from system sleep, IRQs are\nnot enabled until after the resume_noirq phase. And runtime resume is\nalways awaited before a PCI device is removed.)\n\nHowever starting with v6.3, pci_bridge_wait_for_secondary_bus() is also\ncalled on a DPC event. Commit 53b54ad074de (\"PCI/DPC: Await readiness\nof secondary bus after reset\"), which introduced that, failed to\nappreciate that pci_bridge_wait_for_secondary_bus() now needs to hold a\nreference on the child device because dpc_handler() and pciehp may\nindeed run concurrently. The commit was backported to v5.10+ stable\nkernels, so that\u0027s the oldest one affected.\n\nAdd the missing reference acquisition.\n\nAbridged stack trace:\n\n BUG: unable to handle page fault for address: 00000000091400c0\n CPU: 15 PID: 2464 Comm: irq/53-pcie-dpc 6.9.0\n RIP: pci_bus_read_config_dword+0x17/0x50\n pci_dev_wait()\n pci_bridge_wait_for_secondary_bus()\n dpc_reset_link()\n pcie_do_recovery()\n dpc_handler()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42302"
},
{
"cve": "CVE-2024-42304",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: make sure the first directory block is not a hole",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42304"
},
{
"cve": "CVE-2024-42305",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: check dot and dotdot of dx_root before making dir indexed",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42305"
},
{
"cve": "CVE-2024-42306",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nudf: Avoid using corrupted block bitmap buffer",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42306"
},
{
"cve": "CVE-2024-42312",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsysctl: always initialize i_uid/i_gid\r\n\r\nAlways initialize i_uid/i_gid inside the sysfs core so set_ownership()\r\ncan safely skip setting them.\r\n\r\nCommit 5ec27ec735ba (\"fs/proc/proc_sysctl.c: fix the default values of\r\ni_uid/i_gid on /proc/sys inodes.\") added defaults for i_uid/i_gid when\r\nset_ownership() was not implemented. It also missed adjusting\r\nnet_ctl_set_ownership() to use the same default values in case the\r\ncomputation of a better value failed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-42312"
},
{
"cve": "CVE-2024-43828",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix infinite loop when replaying fast_commit\n\nWhen doing fast_commit replay an infinite loop may occur due to an\nuninitialized extent_status struct. ext4_ext_determine_insert_hole() does\nnot detect the replay and calls ext4_es_find_extent_range(), which will\nreturn immediately without initializing the \u0027es\u0027 variable.\n\nBecause \u0027es\u0027 contains garbage, an integer overflow may happen causing an\ninfinite loop in this function, easily reproducible using fstest generic/039.\n\nThis commit fixes this issue by unconditionally initializing the structure\nin function ext4_es_find_extent_range().\n\nThanks to Zhang Yi, for figuring out the real problem!",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43828"
},
{
"cve": "CVE-2024-43830",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nleds: trigger: Unregister sysfs attributes before calling deactivate()\r\n\r\nTriggers which have trigger specific sysfs attributes typically store\r\nrelated data in trigger-data allocated by the activate() callback and\r\nfreed by the deactivate() callback.\r\n\r\nCalling device_remove_groups() after calling deactivate() leaves a window\r\nwhere the sysfs attributes show/store functions could be called after\r\ndeactivation and then operate on the just freed trigger-data.\r\n\r\nMove the device_remove_groups() call to before deactivate() to close\r\nthis race window.\r\n\r\nThis also makes the deactivation path properly do things in reverse order\r\nof the activation path which calls the activate() callback before calling\r\ndevice_add_groups().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43830"
},
{
"cve": "CVE-2024-43834",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nxdp: fix invalid wait context of page_pool_destroy()\r\n\r\nIf the driver uses a page pool, it creates a page pool with\r\npage_pool_create().\r\nThe reference count of page pool is 1 as default.\r\nA page pool will be destroyed only when a reference count reaches 0.\r\npage_pool_destroy() is used to destroy page pool, it decreases a\r\nreference count.\r\nWhen a page pool is destroyed, -\u003edisconnect() is called, which is\r\nmem_allocator_disconnect().\r\nThis function internally acquires mutex_lock().\r\n\r\nIf the driver uses XDP, it registers a memory model with\r\nxdp_rxq_info_reg_mem_model().\r\nThe xdp_rxq_info_reg_mem_model() internally increases a page pool\r\nreference count if a memory model is a page pool.\r\nNow the reference count is 2.\r\n\r\nTo destroy a page pool, the driver should call both page_pool_destroy()\r\nand xdp_unreg_mem_model().\r\nThe xdp_unreg_mem_model() internally calls page_pool_destroy().\r\nOnly page_pool_destroy() decreases a reference count.\r\n\r\nIf a driver calls page_pool_destroy() then xdp_unreg_mem_model(), we\r\nwill face an invalid wait context warning.\r\nBecause xdp_unreg_mem_model() calls page_pool_destroy() with\r\nrcu_read_lock().\r\nThe page_pool_destroy() internally acquires mutex_lock().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43834"
},
{
"cve": "CVE-2024-43856",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma: fix call order in dmam_free_coherent\n\ndmam_free_coherent() frees a DMA allocation, which makes the\nfreed vaddr available for reuse, then calls devres_destroy()\nto remove and free the data structure used to track the DMA\nallocation. Between the two calls, it is possible for a\nconcurrent task to make an allocation with the same vaddr\nand add it to the devres list.\n\nIf this happens, there will be two entries in the devres list\nwith the same vaddr and devres_destroy() can free the wrong\nentry, triggering the WARN_ON() in dmam_match.\n\nFix by destroying the devres entry before freeing the DMA\nallocation.\n\n kokonut //net/encryption\n http://sponge2/b9145fe6-0f72-4325-ac2f-a84d81075b03",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43856"
},
{
"cve": "CVE-2024-43858",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: Fix array-index-out-of-bounds in diFree",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43858"
},
{
"cve": "CVE-2024-43871",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43871"
},
{
"cve": "CVE-2024-43879",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: cfg80211: Currently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in cfg80211_calculate_bitrate_he(), leading to warning.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43879"
},
{
"cve": "CVE-2024-43882",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "exec: the execution may gain unintended privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43882"
},
{
"cve": "CVE-2024-43889",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "padata: vulnerability due to a possible divide-by-zero error in padata_mt_helper() during bootup, caused by an uninitialized chunk_size being zero.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43889"
},
{
"cve": "CVE-2024-43890",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tracing: vulnerability due to an overflow in get_free_elt(), which could lead to infinite loops and CPU hangs when the tracing map becomes full.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43890"
},
{
"cve": "CVE-2024-43893",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "serial: core: vulnerability due to a missing check for uartclk being zero, leading to a potential divide-by-zero error when calling ioctl TIOCSSERIAL with an invalid baud_base.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-43893"
},
{
"cve": "CVE-2024-44935",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "sctp: Fix null-ptr-deref in reuseport_add_sock(). A Null Pointer Dereference in reuseport_add_sock() while accessing sk2-\u003esk_reuseport_cb . The repro first creates a listener with SO_REUSEPORT. Then, it creates another listener on the same port and concurrently closes the first listener. The second listen() calls reuseport_add_sock() with the first listener as sk2, where sk2-\u003esk_reuseport_cb is not expected to be cleared concurrently, but the close() does clear it by reuseport_detach_sock().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-44935"
},
{
"cve": "CVE-2024-44944",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-44944"
},
{
"cve": "CVE-2024-44948",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/mtrr: Check if fixed MTRRs exist before saving them\r\n\r\nMTRRs have an obsolete fixed variant for fine grained caching control\r\nof the 640K-1MB region that uses separate MSRs. This fixed variant has\r\na separate capability bit in the MTRR capability MSR.\r\n\r\nSo far all x86 CPUs which support MTRR have this separate bit set, so it\r\nwent unnoticed that mtrr_save_state() does not check the capability bit\r\nbefore accessing the fixed MTRR MSRs.\r\n\r\nThough on a CPU that does not support the fixed MTRR capability this\r\nresults in a #GP. The #GP itself is harmless because the RDMSR fault is\r\nhandled gracefully, but results in a WARN_ON().\r\n\r\nAdd the missing capability check to prevent this.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-44948"
},
{
"cve": "CVE-2024-44960",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: gadget: core: Check for unset descriptor. It needs to be reassured that the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn\u0027t properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the descriptor for the speed/endpoint are not found. No current gadget driver is known to have this problem, but this may cause a hard-to-find bug during development of new gadgets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-44960"
},
{
"cve": "CVE-2024-44987",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-44987"
},
{
"cve": "CVE-2024-44989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-44989"
},
{
"cve": "CVE-2024-44990",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok We must check if there is an active slave before dereferencing the pointer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-44990"
},
{
"cve": "CVE-2024-45016",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-45016"
},
{
"cve": "CVE-2024-45018",
"cwe": {
"id": "CWE-456",
"name": "Missing Initialization of a Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: initialise extack before use Fix missing initialisation of extack in flow offload.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-45018"
},
{
"cve": "CVE-2024-46679",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46679"
},
{
"cve": "CVE-2024-46743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46743"
},
{
"cve": "CVE-2024-46744",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: Squashfs: sanity check symbolic link size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46744"
},
{
"cve": "CVE-2024-46745",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which causes memory allocation failure in input_mt_init_slots(). While this allocation failure is handled properly and request is rejected, it results in syzkaller reports. Additionally, such request may put undue burden on the system which will try to free a lot of memory for a bogus request. Fix it by limiting allowed number of slots to 100. This can easily be extended if we see devices that can track more than 100 contacts.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46745"
},
{
"cve": "CVE-2024-46750",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46750"
},
{
"cve": "CVE-2024-46759",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: hwmon: (adc128d818) Fix underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user. Fix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46759"
},
{
"cve": "CVE-2024-46783",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: fix return value of tcp_bpf_sendmsg().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46783"
},
{
"cve": "CVE-2024-46854",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: dpaa: Pad packets to ETH_ZLEN\r\n\r\nWhen sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running\r\n\r\n\t$ ping -s 11 destination",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46854"
},
{
"cve": "CVE-2024-46865",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfou: fix initialization of grc\r\nThe grc must be initialize first. There can be a condition where if fou is NULL, goto out will be executed and grc would be used uninitialized.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46865"
},
{
"cve": "CVE-2024-47660",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: fsnotify: clear PARENT_WATCHED flags lazily In some setups directories can have many (usually negative) dentries. Hence __fsnotify_update_child_dentry_flags() function can take a significant amount of time. Since the bulk of this function happens under inode-\u003ei_lock this causes a significant contention on the lock when we remove the watch from the directory as the __fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask() races with __fsnotify_update_child_dentry_flags() calls from __fsnotify_parent() happening on children. This can lead upto softlockup reports reported by users. Fix the problem by calling fsnotify_update_children_dentry_flags() to set PARENT_WATCHED flags only when parent starts watching children. When parent stops watching children, clear false positive PARENT_WATCHED flags lazily in __fsnotify_parent() for each accessed child.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47660"
},
{
"cve": "CVE-2024-47672",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: iwlwifi: mvm: don\u0027t wait for tx queues if firmware is dead\r\n\r\nThere is a WARNING in iwl_trans_wait_tx_queues_empty() (that was recently converted from just a message), that can be hit if we wait for TX queues to become empty after firmware died. Clearly, we can\u0027t expect anything from the firmware after it\u0027s declared dead.\r\n\r\nDon\u0027t call iwl_trans_wait_tx_queues_empty() in this case. While it could be a good idea to stop the flow earlier, the flush functions do some maintenance work that is not related to the firmware, so keep that part of the code running even when the firmware is not running.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47672"
},
{
"cve": "CVE-2024-47684",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: check skb is non-NULL in tcp_rto_delta_us()\r\n\r\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\r\nkernel that are running ceph and recently hit a null ptr dereference in\r\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\r\nsaw it getting hit from the RACK case as well. Here are examples of the oops\r\nmessages we saw in each of those cases:\r\n\r\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\r\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\r\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\r\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\r\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\r\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\r\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\r\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\r\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\r\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\r\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\r\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\r\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\r\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\r\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\r\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\r\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\r\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\r\nJul 26 15:05:02 rx [11061395.919488]\r\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\r\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\r\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\r\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\r\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\r\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\r\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\r\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\r\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\r\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\r\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\r\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\r\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\r\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\r\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\r\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\r\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\r\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\r\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\r\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\r\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47684"
},
{
"cve": "CVE-2024-47685",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()\r\n\r\nsyzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th-\u003eres1)\r\n\r\nUse skb_put_zero() to clear the whole TCP header, as done in nf_reject_ip_tcphdr_put()\r\n\r\nBUG: KMSAN: uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core net/core/dev.c:5661 [inline]\r\n __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5775\r\n process_backlog+0x4ad/0xa50 net/core/dev.c:6108\r\n __napi_poll+0xe7/0x980 net/core/dev.c:6772\r\n napi_poll net/core/dev.c:6841 [inline]\r\n net_rx_action+0xa5a/0x19b0 net/core/dev.c:6963\r\n handle_softirqs+0x1ce/0x800 kernel/softirq.c:554\r\n __do_softirq+0x14/0x1a kernel/softirq.c:588\r\n do_softirq+0x9a/0x100 kernel/softirq.c:455\r\n __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:382\r\n local_bh_enable include/linux/bottom_half.h:33 [inline]\r\n rcu_read_unlock_bh include/linux/rcupdate.h:908 [inline]\r\n __dev_queue_xmit+0x2692/0x5610 net/core/dev.c:4450\r\n dev_queue_xmit include/linux/netdevice.h:3105 [inline]\r\n neigh_resolve_output+0x9ca/0xae0 net/core/neighbour.c:1565\r\n neigh_output include/net/neighbour.h:542 [inline]\r\n ip6_finish_output2+0x2347/0x2ba0 net/ipv6/ip6_output.c:141\r\n __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]\r\n ip6_finish_output+0xbb8/0x14b0 net/ipv6/ip6_output.c:226\r\n NF_HOOK_COND include/linux/netfilter.h:303 [inline]\r\n ip6_output+0x356/0x620 net/ipv6/ip6_output.c:247\r\n dst_output include/net/dst.h:450 [inline]\r\n NF_HOOK include/linux/netfilter.h:314 [inline]\r\n ip6_xmit+0x1ba6/0x25d0 net/ipv6/ip6_output.c:366\r\n inet6_csk_xmit+0x442/0x530 net/ipv6/inet6_connection_sock.c:135\r\n __tcp_transmit_skb+0x3b07/0x4880 net/ipv4/tcp_output.c:1466\r\n tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]\r\n tcp_connect+0x35b6/0x7130 net/ipv4/tcp_output.c:4143\r\n tcp_v6_connect+0x1bcc/0x1e40 net/ipv6/tcp_ipv6.c:333\r\n __inet_stream_connect+0x2ef/0x1730 net/ipv4/af_inet.c:679\r\n inet_stream_connect+0x6a/0xd0 net/ipv4/af_inet.c:750\r\n __sys_connect_file net/socket.c:2061 [inline]\r\n __sys_connect+0x606/0x690 net/socket.c:2078\r\n __do_sys_connect net/socket.c:2088 [inline]\r\n __se_sys_connect net/socket.c:2085 [inline]\r\n __x64_sys_connect+0x91/0xe0 net/socket.c:2085\r\n x64_sys_call+0x27a5/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:43\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was stored to memory at:\r\n nf_reject_ip6_tcphdr_put+0x60c/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:249\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47685"
},
{
"cve": "CVE-2024-47692",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfsd: return -EINVAL when namelen is 0\r\nWhen we have a corrupted main.sqlite in /var/lib/nfs/nfsdcld/, it may result in namelen being 0, which will cause memdup_user() to return ZERO_SIZE_PTR.\r\nWhen we access the name.data that has been assigned the value of ZERO_SIZE_PTR in nfs4_client_to_reclaim(), null pointer dereference is triggered.\r\n\r\n[ T1205] ==================================================================\r\n[ T1205] BUG: KASAN: null-ptr-deref in nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] Read of size 1 at addr 0000000000000010 by task nfsdcld/1205\r\n[ T1205]\r\n[ T1205] CPU: 11 PID: 1205 Comm: nfsdcld Not tainted 5.10.0-00003-g2c1423731b8d #406\r\n[ T1205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014\r\n[ T1205] Call Trace:\r\n[ T1205] dump_stack+0x9a/0xd0\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] __kasan_report.cold+0x34/0x84\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] kasan_report+0x3a/0x50\r\n[ T1205] nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] ? nfsd4_release_lockowner+0x410/0x410\r\n[ T1205] cld_pipe_downcall+0x5ca/0x760\r\n[ T1205] ? nfsd4_cld_tracking_exit+0x1d0/0x1d0\r\n[ T1205] ? down_write_killable_nested+0x170/0x170\r\n[ T1205] ? avc_policy_seqno+0x28/0x40\r\n[ T1205] ? selinux_file_permission+0x1b4/0x1e0\r\n[ T1205] rpc_pipe_write+0x84/0xb0\r\n[ T1205] vfs_write+0x143/0x520\r\n[ T1205] ksys_write+0xc9/0x170\r\n[ T1205] ? __ia32_sys_read+0x50/0x50\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xfe/0x110\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xa2/0x110\r\n[ T1205] do_syscall_64+0x33/0x40\r\n[ T1205] entry_SYSCALL_64_after_hwframe+0x67/0xd1\r\n[ T1205] RIP: 0033:0x7fdbdb761bc7\r\n[ T1205] Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 514\r\n[ T1205] RSP: 002b:00007fff8c4b7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\r\n[ T1205] RAX: ffffffffffffffda RBX: 000000000000042b RCX: 00007fdbdb761bc7\r\n[ T1205] RDX: 000000000000042b RSI: 00007fff8c4b75f0 RDI: 0000000000000008\r\n[ T1205] RBP: 00007fdbdb761bb0 R08: 0000000000000000 R09: 0000000000000001\r\n[ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000042b\r\n[ T1205] R13: 0000000000000008 R14: 00007fff8c4b75f0 R15: 0000000000000000\r\n[ T1205] ==================================================================",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47692"
},
{
"cve": "CVE-2024-47696",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency\r\n\r\nIn the commit aee2424246f9 (\"RDMA/iwcm: Fix a use-after-free related to destroying CM IDs\"), the function flush_workqueue is invoked to flush the work queue iwcm_wq.\r\n\r\nBut at that time, the work queue iwcm_wq was created via the function alloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.\r\n\r\nBecause the current process is trying to flush the whole iwcm_wq, if iwcm_wq doesn\u0027t have the flag WQ_MEM_RECLAIM, verify that the current process is not reclaiming memory or running on a workqueue which doesn\u0027t have the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee leading to a deadlock.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47696"
},
{
"cve": "CVE-2024-47697",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error\r\n\r\nEnsure index in rtl2830_pid_filter does not exceed 31 to prevent out-of-bounds access.\r\n\r\ndev-\u003efilters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access.\r\nChange the boundary check from index \u003e 32 to index \u003e= 32 to resolve this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47697"
},
{
"cve": "CVE-2024-47699",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix potential null-ptr-deref in nilfs_btree_insert()\r\n\r\nPatch series \"nilfs2: fix potential issues with empty b-tree nodes\".\r\n\r\nThis series addresses three potential issues with empty b-tree nodes that can occur with corrupted filesystem images, including one recently discovered by syzbot.\r\n\r\n\r\nThis patch (of 3):\r\n\r\nIf a b-tree is broken on the device, and the b-tree height is greater than 2 (the level of the root node is greater than 1) even if the number of child nodes of the b-tree root is 0, a NULL pointer dereference occurs in nilfs_btree_prepare_insert(), which is called from nilfs_btree_insert().\r\n\r\nThis is because, when the number of child nodes of the b-tree root is 0, nilfs_btree_do_lookup() does not set the block buffer head in any of path[x].bp_bh, leaving it as the initial value of NULL, but if the level of the b-tree root node is greater than 1, nilfs_btree_get_nonroot_node(), which accesses the buffer memory of path[x].bp_bh, is called.\r\n\r\nFix this issue by adding a check to nilfs_btree_root_broken(), which performs sanity checks when reading the root node from the device, to detect this inconsistency.\r\n\r\nThanks to Lizhi Xu for trying to solve the bug and clarifying the cause early on.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47699"
},
{
"cve": "CVE-2024-47701",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid OOB when system.data xattr changes underneath the filesystem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47701"
},
{
"cve": "CVE-2024-47705",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock: fix potential invalid pointer dereference in blk_add_partition\r\n\r\nThe blk_add_partition() function initially used a single if-condition (IS_ERR(part)) to check for errors when adding a partition. This was modified to handle the specific case of -ENXIO separately, allowing the function to proceed without logging the error in this case. However, this change unintentionally left a path where md_autodetect_dev() could be called without confirming that part is a valid pointer.\r\n\r\nThis commit separates the error handling logic by splitting the initial if-condition, improving code readability and handling specific error scenarios explicitly. The function now distinguishes the general error case from -ENXIO without altering the existing behavior of md_autodetect_dev() calls.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47705"
},
{
"cve": "CVE-2024-47706",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock, bfq: fix possible UAF for bfqq-\u003ebic with merge chain\r\n\r\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\r\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\r\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\r\nstate, and set bfqq2-\u003ebic to BIC1.\r\n\r\nAllocated by task 20776:\r\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\r\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\r\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\r\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\r\n slab_post_alloc_hook mm/slab.h:763 [inline]\r\n slab_alloc_node mm/slub.c:3458 [inline]\r\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\r\n ioc_create_icq block/blk-ioc.c:370 [inline]\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47706"
},
{
"cve": "CVE-2024-47707",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: A NULL dereference vulnerability may occur in rt6_uncached_list_flush_dev() due to the necessary check being removed by a previous commit.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47707"
},
{
"cve": "CVE-2024-47709",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "can: bcm: A warning is triggered when connect() is issued again for a socket whose connect()ed device has been unregistered. However, if the socket is just close()d without the 2nd connect(), the remaining bo-\u003ebcm_proc_read triggers unnecessary remove_proc_entry() in bcm_release().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47709"
},
{
"cve": "CVE-2024-47710",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "sock_map: vulnerability result of adding a cond_resched() in sock_hash_free() to prevent CPU soft lockups when destroying maps with a large number of buckets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47710"
},
{
"cve": "CVE-2024-47713",
"cwe": {
"id": "CWE-664",
"name": "Improper Control of a Resource Through its Lifetime"
},
"notes": [
{
"category": "summary",
"text": "wifi: mac80211: vulnerability caused by implementing a two-phase skb reclamation in ieee80211_do_stop() to avoid warnings and potential issues caused by calling __dev_queue_xmit() with interrupts disabled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47713"
},
{
"cve": "CVE-2024-47718",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "wifi: rtw88: vulnerability may lead to a use-after-free (UAF) error if firmware loading is not properly synchronized during USB initialization and disconnection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47718"
},
{
"cve": "CVE-2024-47723",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix out-of-bounds in dbNextAG() and diAlloc()\r\n\r\nIn dbNextAG() , there is no check for the case where bmp-\u003edb_numag is greater or same than MAXAG due to a polluted image, which causes an out-of-bounds. Therefore, a bounds check should be added in dbMount().\r\n\r\nAnd in dbNextAG(), a check for the case where agpref is greater than bmp-\u003edb_numag should be added, so an out-of-bounds exception should be prevented.\r\n\r\nAdditionally, a check for the case where agno is greater or same than MAXAG should be added in diAlloc() to prevent out-of-bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47723"
},
{
"cve": "CVE-2024-47735",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "RDMA/hns: missuse of spin_lock_irq()/spin_unlock_irq() when spin_lock_irqsave()/spin_lock_irqrestore() was hold.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47735"
},
{
"cve": "CVE-2024-47737",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47737"
},
{
"cve": "CVE-2024-47747",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition. In the ether3_probe function, a timer is initialized with a callback function ether3_ledoff, bound to \u0026prev(dev)-\u003etimer. Once the timer is started, there is a risk of a race condition if the module or device is removed, triggering the ether3_remove function to perform cleanup.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47747"
},
{
"cve": "CVE-2024-49851",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "tpm: Clean up TPM space after command failure tpm_dev_transmit prepares the TPM space before attempting command transmission. However if the command fails no rollback of this preparation is done. This can result in transient handles being leaked if the device is subsequently closed with no further commands performed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49851"
},
{
"cve": "CVE-2024-49889",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid use-after-free in ext4_ext_show_leaf()\r\n\r\nIn ext4_find_extent(), path may be freed by error or be reallocated, so\r\nusing a previously saved *ppath may have been freed and thus may trigger\r\nuse-after-free, as follows:\r\n\r\next4_split_extent\r\n path = *ppath;\r\n ext4_split_extent_at(ppath)\r\n path = ext4_find_extent(ppath)\r\n ext4_split_extent_at(ppath)\r\n // ext4_find_extent fails to free path\r\n // but zeroout succeeds\r\n ext4_ext_show_leaf(inode, path)\r\n eh = path[depth].p_hdr\r\n // path use-after-free !!!\r\n\r\nSimilar to ext4_split_extent_at(), we use *ppath directly as an input to\r\next4_ext_show_leaf(). Fix a spelling error by the way.\r\n\r\nSame problem in ext4_ext_handle_unwritten_extents(). Since \u0027path\u0027 is only\r\nused in ext4_ext_show_leaf(), remove \u0027path\u0027 and use *ppath directly.\r\n\r\nThis issue is triggered only when EXT_DEBUG is defined and therefore does\r\nnot affect functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49889"
},
{
"cve": "CVE-2024-49890",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/pm: ensure the fw_info is not null before using it\r\n\r\nThis resolves the dereference null return value warning reported by Coverity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49890"
},
{
"cve": "CVE-2024-49892",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Initialize get_bytes_per_element\u0027s default to 1\r\n\r\nVariables, used as denominators and maybe not assigned to other values, should not be 0. bytes_per_element_y \u0026 bytes_per_element_c are initialized by get_bytes_per_element() which should never return 0.\r\n\r\nThis fixes 10 DIVIDE_BY_ZERO issues reported by Coverity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49892"
},
{
"cve": "CVE-2024-49894",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Fix index out of bounds in degamma hardware format translation\r\n\r\nFixes index out of bounds issue in\r\n`cm_helper_translate_curve_to_degamma_hw_format` function. The issue\r\ncould occur when the index \u0027i\u0027 exceeds the number of transfer function\r\npoints (TRANSFER_FUNC_POINTS).\r\n\r\nThe fix adds a check to ensure \u0027i\u0027 is within bounds before accessing the\r\ntransfer function points. If \u0027i\u0027 is out of bounds the function returns\r\nfalse to indicate an error.\r\n\r\nReported by smatch:\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.red\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.green\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.blue\u0027 1025 \u003c= s32max",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49894"
},
{
"cve": "CVE-2024-49900",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uninit-value access of new_ea in ea_buffer\r\n\r\nsyzbot reports that lzo1x_1_do_compress is using uninit-value:\r\n\r\n=====================================================\r\nBUG: KMSAN: uninit-value in lzo1x_1_do_compress+0x19f9/0x2510 lib/lzo/lzo1x_compress.c:178\r\n\r\n...\r\n\r\nUninit was stored to memory at:\r\n ea_put fs/jfs/xattr.c:639 [inline]\r\n\r\n...\r\n\r\nLocal variable ea_buf created at:\r\n __jfs_setxattr+0x5d/0x1ae0 fs/jfs/xattr.c:662\r\n __jfs_xattr_set+0xe6/0x1f0 fs/jfs/xattr.c:934\r\n\r\n=====================================================\r\n\r\nThe reason is ea_buf-\u003enew_ea is not initialized properly.\r\n\r\nFix this by using memset to empty its content at the beginning\r\nin ea_get().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49900"
},
{
"cve": "CVE-2024-49902",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "jfs: vulnerability caused by assigning msm_gpu-\u003epdev earlier in the initialization process to prevent null pointer dereferences in msm_gpu_cleanup.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49902"
},
{
"cve": "CVE-2024-49903",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uaf in dbFreeBits\r\n\r\n[syzbot reported]\r\n==================================================================\r\nBUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\nBUG: KASAN: slab-use-after-free in __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\nRead of size 8 at addr ffff8880229254b0 by task syz-executor357/5216\r\n\r\nCPU: 0 UID: 0 PID: 5216 Comm: syz-executor357 Not tainted 6.11.0-rc3-syzkaller-00156-gd7a5aa4b3c00 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024\r\nCall Trace:\r\n \u003cTASK\u003e\r\n __dump_stack lib/dump_stack.c:93 [inline]\r\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\r\n print_address_description mm/kasan/report.c:377 [inline]\r\n print_report+0x169/0x550 mm/kasan/report.c:488\r\n kasan_report+0x143/0x180 mm/kasan/report.c:601\r\n __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\n __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\n dbFreeBits+0x7ea/0xd90 fs/jfs/jfs_dmap.c:2390\r\n dbFreeDmap fs/jfs/jfs_dmap.c:2089 [inline]\r\n dbFree+0x35b/0x680 fs/jfs/jfs_dmap.c:409\r\n dbDiscardAG+0x8a9/0xa20 fs/jfs/jfs_dmap.c:1650\r\n jfs_ioc_trim+0x433/0x670 fs/jfs/jfs_discard.c:100\r\n jfs_ioctl+0x2d0/0x3e0 fs/jfs/ioctl.c:131\r\n vfs_ioctl fs/ioctl.c:51 [inline]\r\n __do_sys_ioctl fs/ioctl.c:907 [inline]\r\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n\r\nFreed by task 5218:\r\n kasan_save_stack mm/kasan/common.c:47 [inline]\r\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\r\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579\r\n poison_slab_object+0xe0/0x150 mm/kasan/common.c:240\r\n __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256\r\n kasan_slab_free include/linux/kasan.h:184 [inline]\r\n slab_free_hook mm/slub.c:2252 [inline]\r\n slab_free mm/slub.c:4473 [inline]\r\n kfree+0x149/0x360 mm/slub.c:4594\r\n dbUnmount+0x11d/0x190 fs/jfs/jfs_dmap.c:278\r\n jfs_mount_rw+0x4ac/0x6a0 fs/jfs/jfs_mount.c:247\r\n jfs_remount+0x3d1/0x6b0 fs/jfs/super.c:454\r\n reconfigure_super+0x445/0x880 fs/super.c:1083\r\n vfs_cmd_reconfigure fs/fsopen.c:263 [inline]\r\n vfs_fsconfig_locked fs/fsopen.c:292 [inline]\r\n __do_sys_fsconfig fs/fsopen.c:473 [inline]\r\n __se_sys_fsconfig+0xb6e/0xf80 fs/fsopen.c:345\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\n[Analysis]\r\nThere are two paths (dbUnmount and jfs_ioc_trim) that generate race condition when accessing bmap, which leads to the occurrence of uaf.\r\n\r\nUse the lock s_umount to synchronize them, in order to avoid uaf caused by race condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49903"
},
{
"cve": "CVE-2024-49930",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "wifi: ath11k: fix array out-of-bound access in SoC stats. Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx() function access ath11k_soc_dp_stats::hal_reo_error using the REO destination SRNG ring ID, which is incorrect. SRNG ring ID differ from normal ring ID, and this usage leads to out-of-bounds array access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49930"
},
{
"cve": "CVE-2024-49938",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit\r\n\r\nSyzbot points out that skb_trim() has a sanity check on the existing length of the skb, which can be uninitialised in some error paths. The intent here is clearly just to reset the length to zero before resubmitting, so switch to calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length() already contains a call to skb_reset_tail_pointer(), so remove the redundant call.\r\n\r\nThe syzbot report came from ath9k_hif_usb_reg_in_cb(), but there\u0027s a similar usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we\u0027re at it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49938"
},
{
"cve": "CVE-2024-49944",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start. In sctp_listen_start() invoked by sctp_inet_listen(), it should set the sk_state back to CLOSED if sctp_autobind() fails due to whatever reason. Otherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)-\u003ereuse is already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)-\u003ebind_hash will be dereferenced as sk_state is LISTENING, which causes a crash as bind_hash is NULL",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49944"
},
{
"cve": "CVE-2024-49948",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49948"
},
{
"cve": "CVE-2024-49949",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: avoid potential underflow in qdisc_pkt_len_init() with UFO.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49949"
},
{
"cve": "CVE-2024-49952",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prevent nf_skb_duplicated corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49952"
},
{
"cve": "CVE-2024-49955",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nACPI: battery: Fix possible crash when unregistering a battery hook\r\n\r\nWhen a battery hook returns an error when adding a new battery, then the battery hook is automatically unregistered.\r\nHowever the battery hook provider cannot know that, so it will later call battery_hook_unregister() on the already unregistered battery hook, resulting in a crash.\r\n\r\nFix this by using the list head to mark already unregistered battery hooks as already being unregistered so that they can be ignored by battery_hook_unregister().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49955"
},
{
"cve": "CVE-2024-49973",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "r8169: RTL8125 added fields to the tally counter, this change could cause the chip to perform Direct Memory Access on these new fields, potentially writing to unallocated memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49973"
},
{
"cve": "CVE-2024-49977",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: stmmac: port_transmit_rate_kbps could be set to a value of 0, which is then passed to the \"div_s64\" function when tc-cbs is disabled. This leads to a zero-division error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49977"
},
{
"cve": "CVE-2024-49997",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix memory disclosure When applying padding, the buffer is not zeroed, which results in memory disclosure. The mentioned data is observed on the wire. This patch uses skb_put_padto() to pad Ethernet frames properly. The mentioned function zeroes the expanded buffer. In case the packet cannot be padded it is silently dropped. Statistics are also not incremented. This driver does not support statistics in the old 32-bit format or the new 64-bit format. These will be added in the future. In its current form, the patch should be easily backported to stable versions. Ethernet MACs on Amazon-SE and Danube cannot do padding of the packets in hardware, so software padding must be applied.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-49997"
},
{
"cve": "CVE-2024-50001",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/mlx5: Fix error path in multi-packet WQE transmit\r\n\r\nRemove the erroneous unmap in case no DMA mapping was established\r\n\r\nThe multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. This could fail, e.g. under memory pressure, when the IOMMU driver just can\u0027t allocate more memory for page tables. While the code tries to handle this in the path below the err_unmap label it erroneously unmaps one entry from the sq\u0027s FIFO list of active mappings. Since the current map attempt failed this unmap is removing some random DMA mapping that might still be required. If the PCI function now presents that IOVA, the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI function in error state.\r\n\r\nThe erroneous behavior was seen in a stress-test environment that created memory pressure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50001"
},
{
"cve": "CVE-2024-50006",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50006"
},
{
"cve": "CVE-2024-50008",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "wifi: mwifiex: memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() Replace one-element array with a flexible-array member in `struct host_cmd_ds_802_11_scan_ext`.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50008"
},
{
"cve": "CVE-2024-50010",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nexec: don\u0027t WARN for racy path_noexec check\r\n\r\nBoth i_mode and noexec checks wrapped in WARN_ON stem from an artifact\r\nof the previous implementation. They used to legitimately check for the\r\ncondition, but that got moved up in two commits:\r\n633fb6ac3980 (\"exec: move S_ISREG() check earlier\")\r\n0fd338b2d2cd (\"exec: move path_noexec() check earlier\")\r\n\r\nInstead of being removed said checks are WARN_ON\u0027ed instead, which has some debug value.\r\n\r\nHowever, the spurious path_noexec check is racy, resulting in unwarranted warnings should someone race with setting the noexec flag.\r\n\r\nOne can note there is more to perm-checking whether execve is allowed and none of the conditions are guaranteed to still hold after they were tested for.\r\n\r\nAdditionally this does not validate whether the code path did any perm checking to begin with -- it will pass if the inode happens to be regular.\r\n\r\nKeep the redundant path_noexec() check even though it\u0027s mindless nonsense checking for guarantee that isn\u0027t given so drop the WARN.\r\n\r\nReword the commentary and do small tidy ups while here.\r\n\r\n[brauner: keep redundant path_noexec() check]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50010"
},
{
"cve": "CVE-2024-50015",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "ext4: dax: Overflowing extents beyond inode size when partially writing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50015"
},
{
"cve": "CVE-2024-50033",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nslip: make slhc_remember() more robust against malicious packets\r\n\r\nsyzbot found that slhc_remember() was missing checks against\r\nmalicious packets [1].\r\n\r\nslhc_remember() only checked the size of the packet was at least 20,\r\nwhich is not good enough.\r\n\r\nWe need to make sure the packet includes the IPv4 and TCP header\r\nthat are supposed to be carried.\r\n\r\nAdd iph and th pointers to make the code more readable.\r\n\r\n[1]\r\n\r\nBUG: KMSAN: uninit-value in slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n ppp_receive_nonmp_frame+0xe45/0x35e0 drivers/net/ppp/ppp_generic.c:2455\r\n ppp_receive_frame drivers/net/ppp/ppp_generic.c:2372 [inline]\r\n ppp_do_recv+0x65f/0x40d0 drivers/net/ppp/ppp_generic.c:2212\r\n ppp_input+0x7dc/0xe60 drivers/net/ppp/ppp_generic.c:2327\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4091 [inline]\r\n slab_alloc_node mm/slub.c:4134 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4186\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 0 UID: 0 PID: 5460 Comm: syz.2.33 Not tainted 6.12.0-rc2-syzkaller-00006-g87d6aab2389e #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50033"
},
{
"cve": "CVE-2024-50035",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp: fix ppp_async_encode() illegal access\r\n\r\nsyzbot reported an issue in ppp_async_encode() [1]\r\n\r\nIn this case, pppoe_sendmsg() is called with a zero size.\r\nThen ppp_async_encode() is called with an empty skb.\r\n\r\nBUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634\r\n ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]\r\n ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4092 [inline]\r\n slab_alloc_node mm/slub.c:4135 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50035"
},
{
"cve": "CVE-2024-50039",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/sched: accept TCA_STAB only for root qdisc\r\n\r\nMost qdiscs maintain their backlog using qdisc_pkt_len(skb) on the assumption it is invariant between the enqueue() and dequeue() handlers.\r\n\r\nUnfortunately syzbot can crash a host rather easily using a TBF + SFQ combination, with an STAB on SFQ [1]\r\n\r\nWe can\u0027t support TCA_STAB on arbitrary level, this would require to maintain per-qdisc storage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50039"
},
{
"cve": "CVE-2024-50040",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: igb: Do not bring the device up after non-fatal error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50040"
},
{
"cve": "CVE-2024-50044",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change\r\n\r\nrfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50044"
},
{
"cve": "CVE-2024-50045",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: fix panic with metadata_dst skb.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50045"
},
{
"cve": "CVE-2024-50046",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nNFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()\r\n\r\nOn the node of an NFS client, some files saved in the mountpoint of the NFS server were copied to another location of the same NFS server.\r\nAccidentally, the nfs42_complete_copies() got a NULL-pointer dereference crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50046"
},
{
"cve": "CVE-2024-50058",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nserial: protect uart_port_dtr_rts() in uart_shutdown() too\r\n\r\nCommit af224ca2df29 (serial: core: Prevent unsafe uart port access, part 3) added few uport == NULL checks. It added one to uart_shutdown(), so the commit assumes, uport can be NULL in there. But right after that protection, there is an unprotected \"uart_port_dtr_rts(uport, false);\" call. That is invoked only if HUPCL is set, so I assume that is the reason why we do not see lots of these reports.\r\n\r\nOr it cannot be NULL at this point at all for some reason :P.\r\n\r\nUntil the above is investigated, stay on the safe side and move this dereference to the if too.\r\n\r\nI got this inconsistency from Coverity under CID 1585130. Thanks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50058"
},
{
"cve": "CVE-2024-50095",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/mad: Improve handling of timed out WRs of mad agent\r\n\r\nCurrent timeout handler of mad agent acquires/releases mad_agent_priv lock for every timed out WRs. This causes heavy locking contention when higher no. of WRs are to be handled inside timeout handler.\r\n\r\nThis leads to softlockup with below trace in some use cases where rdma-cm path is used to establish connection between peer nodes\r\n\r\n\r\nSimplified timeout handler by creating local list of timed out WRs and invoke send handler post creating the list. The new method acquires/releases lock once to fetch the list and hence helps to reduce locking contetiong when processing higher no. of WRs",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50095"
},
{
"cve": "CVE-2024-50121",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "nfsd: problematic nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net. In the normal case, when we excute `echo 0 \u003e /proc/fs/nfsd/threads`, the function `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will release all resources related to the hashed `nfs4_client`.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50121"
},
{
"cve": "CVE-2024-50127",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: sched: fix use-after-free in taprio_change()\r\n\r\nIn \u0027taprio_change()\u0027, \u0027admin\u0027 pointer may become dangling due to sched switch / removal caused by \u0027advance_sched()\u0027, and critical section protected by \u0027q-current_entry_lock\u0027 is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer \u0027rcu_replace_pointer()\u0027 ver \u0027rcu_assign_pointer()\u0027 to update \u0027admin\u0027 immediately before an attempt to schedule freeing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50127"
},
{
"cve": "CVE-2024-50131",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntracing: Consider the NULL character when validating the event length\r\n\r\nstrlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer length, the buffer will have no space for the NULL terminating character.\r\n\r\nThis commit checks this condition and returns failure for it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50131"
},
{
"cve": "CVE-2024-50134",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA\r\n\r\nReplace the fake VLA at end of the vbva_mouse_pointer_shape shape with a real VLA to fix a \"memcpy: detected field-spanning write error\".\r\n\r\nNote as mentioned in the added comment it seems the original length calculation for the allocated and send hgsmi buffer is 4 bytes too large.\r\nChanging this is not the goal of this patch, so this behavior is kept.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50134"
},
{
"cve": "CVE-2024-50142",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nxfrm: validate new SA\u0027s prefixlen using SA family when sel.family is unset\r\n\r\nThis expands the validation introduced in commit 07bf7908950a (\"xfrm:Validate address prefix lengths in the xfrm selector.\")\r\n\r\nsyzbot created an SA with\r\n usersa.sel.family = AF_UNSPEC\r\n usersa.sel.prefixlen_s = 128\r\n usersa.family = AF_INET\r\n\r\nBecause of the AF_UNSPEC selector, verify_newsa_info doesn\u0027t put limits on prefixlen_{s,d}. But then copy_from_user_state sets x-\u003esel.family to usersa.family (AF_INET). Do the same conversion inverify_newsa_info before validating prefixlen_{s,d}, since that\u0027s howprefixlen is going to be used later on.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50142"
},
{
"cve": "CVE-2024-50148",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: bnep: fix wild-memory-access in proto_unregister\r\n\r\nAs bnep_init() ignore bnep_sock_init()\u0027s return value, and bnep_sock_init() will cleanup all resource. Then when remove bnep module will call bnep_sock_cleanup() to cleanup sock\u0027s resource.\r\nTo solve above issue just return bnep_sock_init()\u0027s return value in bnep_exit().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50148"
},
{
"cve": "CVE-2024-50150",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: typec: altmode should keep reference to parent\r\n\r\nThe altmode device release refers to its parent device, but without keeping\r\na reference to it.\r\n\r\nWhen registering the altmode, get a reference to the parent and put it in\r\nthe release function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50150"
},
{
"cve": "CVE-2024-50151",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsmb: client: fix OOBs when building SMB2_IOCTL request\r\n\r\nWhen using encryption, either enforced by the server or when using\r\n\u0027seal\u0027 mount option, the client will squash all compound request buffers\r\ndown for encryption into a single iov in smb2_set_next_command().\r\n\r\nSMB2_ioctl_init() allocates a small buffer (448 bytes) to hold the\r\nSMB2_IOCTL request in the first iov, and if the user passes an input\r\nbuffer that is greater than 328 bytes, smb2_set_next_command() will\r\nend up writing off the end of @rqst-\u003eiov[0].iov_base as shown below:\r\n\r\n mount.cifs //srv/share /mnt -o ...,seal\r\n ln -s $(perl -e \"print(\u0027a\u0027)for 1..1024\") /mnt/link\r\n\r\n BUG: KASAN: slab-out-of-bounds in\r\n smb2_set_next_command.cold+0x1d6/0x24c [cifs]\r\n Write of size 4116 at addr ffff8881148fcab8 by task ln/859",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50151"
},
{
"cve": "CVE-2024-50153",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: target: core: Fix null-ptr-deref in target_alloc_device()\r\n\r\nThere is a null-ptr-deref issue reported by KASAN:\r\n\r\nBUG: KASAN: null-ptr-deref in target_alloc_device+0xbc4/0xbe0 [target_core_mod]\r\n...\r\n kasan_report+0xb9/0xf0\r\n target_alloc_device+0xbc4/0xbe0 [target_core_mod]\r\n core_dev_setup_virtual_lun0+0xef/0x1f0 [target_core_mod]\r\n target_core_init_configfs+0x205/0x420 [target_core_mod]\r\n do_one_initcall+0xdd/0x4e0\r\n...\r\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\r\n\r\nIn target_alloc_device(), if allocing memory for dev queues fails, then\r\ndev will be freed by dev-\u003etransport-\u003efree_device(), but dev-\u003etransport\r\nis not initialized at that time, which will lead to a null pointer\r\nreference problem.\r\n\r\nFixing this bug by freeing dev with hba-\u003ebackend-\u003eops-\u003efree_device().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50153"
},
{
"cve": "CVE-2024-50188",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "net: phy: dp83869: fix memory corruption when enabling fiber. When configuring the fiber port, the DP83869 PHY driver incorrectly calls linkmode_set_bit() with a bit mask (1 \u0026lt;\u0026lt; 10) rather than a bit number (10). This corrupts some other memory location -- in case of arm64 the priv pointer in the same structure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50188"
},
{
"cve": "CVE-2024-50205",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()\r\n\r\nThe step variable is initialized to zero. It is changed in the loop,\r\nbut if it\u0027s not changed it will remain zero. Add a variable check\r\nbefore the division.\r\n\r\nThe observed behavior was introduced by commit 826b5de90c0b\r\n(\"ALSA: firewire-lib: fix insufficient PCM rule for period/buffer size\"),\r\nand it is difficult to show that any of the interval parameters will\r\nsatisfy the snd_interval_test() condition with data from the\r\namdtp_rate_table[] table.\r\n\r\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50205"
},
{
"cve": "CVE-2024-50210",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nposix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()\r\n\r\nIf get_clock_desc() succeeds, it calls fget() for the clockid\u0027s fd,\r\nand get the clk-\u003erwsem read lock, so the error path should release\r\nthe lock to make the lock balance and fput the clockid\u0027s fd to make\r\nthe refcount balance and release the fd related resource.\r\n\r\nHowever the below commit left the error path locked behind resulting in\r\nunbalanced locking. Check timespec64_valid_strict() before\r\nget_clock_desc() to fix it, because the \"ts\" is not changed\r\nafter that.\r\n\r\n[pabeni@redhat.com: fixed commit message typo]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50210"
},
{
"cve": "CVE-2024-50251",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() If access to offset + length is larger than the skbuff length, then skb_checksum() triggers BUG_ON(). skb_checksum() internally subtracts the length parameter while iterating over skbuff, BUG_ON(len) at the end of it checks that the expected length to be included in the checksum calculation is fully consumed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50251"
},
{
"cve": "CVE-2024-50262",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50262"
},
{
"cve": "CVE-2024-50299",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50299"
},
{
"cve": "CVE-2024-50301",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50301"
},
{
"cve": "CVE-2024-50302",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let\u0027s zero-initialize it during allocation to make sure that it can\u0027t be ever used to leak kernel memory via specially-crafted report.",
"title": "Summary"
},
{
"category": "summary",
"text": "The information disclosure is limited to HID driver report data. Successful exploitation requires the installation of malicious code on the device.",
"title": "For SIMATIC S7-1500 TM MFP - GNU/Linux subsystem"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50302"
},
{
"cve": "CVE-2024-53042",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()\r\n\r\nThere are code paths from which the function is called without holding\r\nthe RCU read lock, resulting in a suspicious RCU usage warning [1].\r\n\r\nFix by using l3mdev_master_upper_ifindex_by_index() which will acquire\r\nthe RCU read lock before calling\r\nl3mdev_master_upper_ifindex_by_index_rcu().\r\n\r\n[1]\r\nWARNING: suspicious RCU usage\r\n6.12.0-rc3-custom-gac8f72681cf2 #141 Not tainted\r\n-----------------------------\r\nnet/core/dev.c:876 RCU-list traversed in non-reader section!!\r\n\r\nother info that might help us debug this:\r\n\r\nrcu_scheduler_active = 2, debug_locks = 1\r\n1 lock held by ip/361:\r\n #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-53042"
},
{
"cve": "CVE-2024-53057",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-53057"
},
{
"cve": "CVE-2024-53059",
"cwe": {
"id": "CWE-460",
"name": "Improper Cleanup on Thrown Exception"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()\r\n\r\n1. The size of the response packet is not validated.\r\n2. The response buffer is not freed.\r\n\r\nResolve these issues by switching to iwl_mvm_send_cmd_status(), which handles both size validation and frees the buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-53059"
},
{
"cve": "CVE-2024-53101",
"cwe": {
"id": "CWE-456",
"name": "Missing Initialization of a Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized value issue in from_kuid and from_kgid ocfs2_setattr() uses attr-\u003eia_mode, attr-\u003eia_uid and attr-\u003eia_gid in a trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren\u0027t set. Initialize all fields of newattrs to avoid uninitialized variables, by checking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-53101"
},
{
"cve": "CVE-2024-53124",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "net: fix data-races around sk sk_forward_alloc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-53124"
},
{
"cve": "CVE-2024-56631",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\nscsi: sg: Fix slab-use-after-free read in sg_release()\r\nFix a use-after-free bug in sg_release(), detected by syzbot with KASAN:\r\n\r\nThe fix has been tested and validated by syzbot. This patch closes the\r\nbug reported at the following syzkaller link and ensures proper\r\nsequencing of resource cleanup and mutex operations, eliminating the\r\nrisk of use-after-free errors in sg_release().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-56631"
},
{
"cve": "CVE-2024-56672",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix UAF in blkcg_unpin_online()\r\n\r\nblkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To\r\nwalk up, it uses blkcg_parent(blkcg) but it was calling that after\r\nblkcg_destroy_blkgs(blkcg) which could free the blkcg",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-56672"
},
{
"cve": "CVE-2024-57901",
"cwe": {
"id": "CWE-664",
"name": "Improper Control of a Resource Through its Lifetime"
},
"notes": [
{
"category": "summary",
"text": "af_packet: vlan_get_protocol_dgram() vs MSG_PEEK Blamed allowing a crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57901"
},
{
"cve": "CVE-2024-57902",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\naf_packet: fix vlan_get_tci() vs MSG_PEEK\r\n\r\nBlamed commit forgot MSG_PEEK case, allowing a crash [1] as found\r\nby syzbot.\r\n\r\nRework vlan_get_tci() to not touch skb at all,\r\nso that it can be used from many cpus on the same skb.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57902"
},
{
"cve": "CVE-2024-57913",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: f_fs: Remove WARN_ON in functionfs_bind",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57913"
},
{
"cve": "CVE-2024-57929",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndm array: fix releasing a faulty array block twice in dm_array_cursor_end\r\n\r\nWhen dm_bm_read_lock() fails due to locking or checksum errors, it\r\nreleases the faulty block implicitly while leaving an invalid output\r\npointer behind. The caller of dm_bm_read_lock() should not operate on\r\nthis invalid dm_block pointer, or it will lead to undefined result.\r\nFor example, the dm_array_cursor incorrectly caches the invalid pointer\r\non reading a faulty array block, causing a double release in\r\ndm_array_cursor_end(), then hitting the BUG_ON in dm-bufio cache_put().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57929"
},
{
"cve": "CVE-2024-57940",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "exfat: fix the infinite loop in exfat_readdir() If the file system is corrupted so that a cluster is linked to itself in the cluster chain, and there is an unused directory entry in the cluster, dentry will not be incremented, causing condition dentry \u003c max_dentries unable to prevent an infinite loop. This infinite loop causes s_lock not to be released, and other tasks will hang, such as exfat_sync_fs().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57940"
},
{
"cve": "CVE-2024-57948",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmac802154: check local interfaces before deleting sdata list\r\n\r\nsyzkaller reported a corrupted list in ieee802154_if_remove. [1]\r\n\r\nRemove an IEEE 802.15.4 network interface after unregister an IEEE 802.15.4\r\nhardware device from the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57948"
},
{
"cve": "CVE-2024-57951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhrtimers: Handle CPU state correctly on hotplug\r\n\r\nConsider a scenario where a CPU transitions from CPUHP_ONLINE to halfway\r\nthrough a CPU hotunplug down to CPUHP_HRTIMERS_PREPARE, and then back to\r\nCPUHP_ONLINE:\r\n\r\nSince hrtimers_prepare_cpu() does not run, cpu_base.hres_active remains set\r\nto 1 throughout. However, during a CPU unplug operation, the tick and the\r\nclockevents are shut down at CPUHP_AP_TICK_DYING. On return to the online\r\nstate, for instance CFS incorrectly assumes that the hrtick is already\r\nactive, and the chance of the clockevent device to transition to oneshot\r\nmode is also lost forever for the CPU, unless it goes back to a lower state\r\nthan CPUHP_HRTIMERS_PREPARE once.\r\n\r\nThis round-trip reveals another issue; cpu_base.online is not set to 1\r\nafter the transition, which appears as a WARN_ON_ONCE in enqueue_hrtimer().\r\n\r\nAside of that, the bulk of the per CPU state is not reset either, which\r\nmeans there are dangling pointers in the worst case.\r\n\r\nAddress this by adding a corresponding startup() callback, which resets the\r\nstale per CPU state and sets the online flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57951"
},
{
"cve": "CVE-2024-57977",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "memcg: A soft lockup vulnerability in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup was triggered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57977"
},
{
"cve": "CVE-2024-57979",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "pps: Fix a use-after-free",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57979"
},
{
"cve": "CVE-2024-57981",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "usb: xhci: NULL pointer dereference on certain command aborts. If a command is queued to the final usable TRB of a ring segment, the enqueue pointer is advanced to the subsequent link TRB and no further. If the command is later aborted, when the abort completion is handled the dequeue pointer is advanced to the first TRB of the next segment. If no further commands are queued, xhci_handle_stopped_cmd_ring() sees the ring pointers unequal and assumes that there is a pending command, so it calls xhci_mod_cmd_timer() which crashes if cur_cmd was NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57981"
},
{
"cve": "CVE-2024-57986",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-57986"
},
{
"cve": "CVE-2024-58005",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tpm: Change to kvalloc() in eventlog/acpi.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58005"
},
{
"cve": "CVE-2024-58009",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58009"
},
{
"cve": "CVE-2024-58014",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58014"
},
{
"cve": "CVE-2024-58016",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "safesetid: check size of policy writes",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58016"
},
{
"cve": "CVE-2024-58017",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58017"
},
{
"cve": "CVE-2024-58020",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "HID: multitouch: Add NULL check in mt_input_configured",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58020"
},
{
"cve": "CVE-2024-58051",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipmi: ipmb: Add check devm_kasprintf() returned value",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58051"
},
{
"cve": "CVE-2024-58058",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ubifs: skip dumping tnc tree when zroot is null",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58058"
},
{
"cve": "CVE-2024-58063",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "wifi: rtlwifi: fix memory leaks and invalid access at probe error path",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58063"
},
{
"cve": "CVE-2024-58071",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "team: prevent adding a device which is already a team device lower",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58071"
},
{
"cve": "CVE-2024-58072",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: rtlwifi: remove unused check_buddy_priv",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58072"
},
{
"cve": "CVE-2024-58085",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tomoyo: don\u0027t emit warning in tomoyo_write_control()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-58085"
},
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-9230"
},
{
"cve": "CVE-2025-21638",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: sysctl: auth_enable: avoid using current-\u003ensproxy\n\nAs mentioned in a previous commit of this series, using the \u0027net\u0027\nstructure via \u0027current\u0027 is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader\u0027s/writer\u0027s netns vs only\n from the opener\u0027s netns.\n\n- current-\u003ensproxy can be NULL in some cases, resulting in an \u0027Oops\u0027\n (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n syzbot [1] using acct(2).\n\nThe \u0027net\u0027 structure can be obtained from the table-\u003edata using\ncontainer_of().\n\nNote that table-\u003edata could also be used directly, but that would\nincrease the size of this fix, while \u0027sctp.ctl_sock\u0027 still needs to be\nretrieved from \u0027net\u0027 structure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21638"
},
{
"cve": "CVE-2025-21639",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: sysctl: rto_min/max: avoid using current-\u003ensproxy\n\nAs mentioned in a previous commit of this series, using the \u0027net\u0027\nstructure via \u0027current\u0027 is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader\u0027s/writer\u0027s netns vs only\n from the opener\u0027s netns.\n\n- current-\u003ensproxy can be NULL in some cases, resulting in an \u0027Oops\u0027\n (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n syzbot [1] using acct(2).\n\nThe \u0027net\u0027 structure can be obtained from the table-\u003edata using\ncontainer_of().\n\nNote that table-\u003edata could also be used directly, as this is the only\nmember needed from the \u0027net\u0027 structure, but that would increase the size\nof this fix, to use \u0027*data\u0027 everywhere \u0027net-\u003esctp.rto_min/max\u0027 is used.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21639"
},
{
"cve": "CVE-2025-21640",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: sysctl: cookie_hmac_alg: avoid using current-\u003ensproxy\n\nAs mentioned in a previous commit of this series, using the \u0027net\u0027\nstructure via \u0027current\u0027 is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader\u0027s/writer\u0027s netns vs only\n from the opener\u0027s netns.\n\n- current-\u003ensproxy can be NULL in some cases, resulting in an \u0027Oops\u0027\n (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n syzbot [1] using acct(2).\n\nThe \u0027net\u0027 structure can be obtained from the table-\u003edata using\ncontainer_of().\n\nNote that table-\u003edata could also be used directly, as this is the only\nmember needed from the \u0027net\u0027 structure, but that would increase the size\nof this fix, to use \u0027*data\u0027 everywhere \u0027net-\u003esctp.sctp_hmac_alg\u0027 is\nused.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21640"
},
{
"cve": "CVE-2025-21647",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\nsched: sch_cake: add bounds checks to host bulk flow fairness counts",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21647"
},
{
"cve": "CVE-2025-21648",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: conntrack: clamp maximum hashtable size to INT_MAX\r\n\r\nUse INT_MAX as maximum size for the conntrack hashtable. Otherwise, it\r\nis possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when\r\nresizing hashtable because __GFP_NOWARN is unset. See:\r\n\r\n 0708a0afe291 (\"mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls\")\r\n\r\nNote: hashtable resize is only possible from init_netns.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21648"
},
{
"cve": "CVE-2025-21653",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21653"
},
{
"cve": "CVE-2025-21664",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "dm thin: make get_first_thin use rcu-safe list first function",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21664"
},
{
"cve": "CVE-2025-21666",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "vsock: prevent null-ptr-deref in vsock_has_data|has_space",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21666"
},
{
"cve": "CVE-2025-21669",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "vsock/virtio: discard packets if the transport changes",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21669"
},
{
"cve": "CVE-2025-21678",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "gtp: Destroy device along with udp socket\u0027s netns dismantle",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21678"
},
{
"cve": "CVE-2025-21683",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "bpf: Fix bpf_sk_select_reuseport() memory leak",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21683"
},
{
"cve": "CVE-2025-21692",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "net: sched: fix ets qdisc OOB Indexing",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21692"
},
{
"cve": "CVE-2025-21694",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "fs/proc: softlockup in __read_vmcore",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21694"
},
{
"cve": "CVE-2025-21704",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: cdc-acm: Check control transfer buffer size before access",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21704"
},
{
"cve": "CVE-2025-21711",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "net/rose: prevent integer overflows in rose_setsockopt()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21711"
},
{
"cve": "CVE-2025-21719",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipmr: do not call mr_mfc_uses_dev() for unres entries",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21719"
},
{
"cve": "CVE-2025-21726",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "padata: avoid UAF for reorder_work",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21726"
},
{
"cve": "CVE-2025-21727",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "padata: fix UAF in padata_reorder",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21727"
},
{
"cve": "CVE-2025-21728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21728"
},
{
"cve": "CVE-2025-21735",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "NFC: nci: Add bounds checking in nci_hci_create_pipe()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21735"
},
{
"cve": "CVE-2025-21744",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21744"
},
{
"cve": "CVE-2025-21745",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix class @block_class\u0027s subsystem refcount leakage\r\n\r\nblkcg_fill_root_iostats() iterates over @block_class\u0027s devices by\r\nclass_dev_iter_(init|next)(), but does not end iterating with\r\nclass_dev_iter_exit(), so causes the class\u0027s subsystem refcount leakage.\r\n\r\nFix by ending the iterating with class_dev_iter_exit().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21745"
},
{
"cve": "CVE-2025-21753",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "btrfs: fix use-after-free when attempting to join an aborted transaction",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21753"
},
{
"cve": "CVE-2025-21756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21756"
},
{
"cve": "CVE-2025-21760",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ndisc: extend RCU protection in ndisc_send_skb()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21760"
},
{
"cve": "CVE-2025-21761",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "openvswitch: use RCU protection in ovs_vport_cmd_fill_info()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21761"
},
{
"cve": "CVE-2025-21762",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21762"
},
{
"cve": "CVE-2025-21763",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "neighbour: use RCU protection in __neigh_notify()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21763"
},
{
"cve": "CVE-2025-21764",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ndisc: use RCU protection in ndisc_alloc_skb()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21764"
},
{
"cve": "CVE-2025-21765",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21765"
},
{
"cve": "CVE-2025-21772",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "partitions: mac: fix handling of bogus partition table",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-21776",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "USB: hub: Ignore non-compliant devices with too many configs or interfaces. A test program can cause usb_hub_to_struct_hub() to dereference a NULL or inappropriate pointer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21776"
},
{
"cve": "CVE-2025-21787",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "team: better TEAM_OPTION_TYPE_STRING validation",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21787"
},
{
"cve": "CVE-2025-21795",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NFSD: hang in nfsd4_shutdown_callback. If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21795"
},
{
"cve": "CVE-2025-21796",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfsd: clear acl_access/acl_default after releasing them If getting acl_default fails, acl_access and acl_default will be released simultaneously.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21796"
},
{
"cve": "CVE-2025-21806",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: let net.core.dev_weight always be non-zero. The following problem was encountered during stability test: (NULL net_device).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21806"
},
{
"cve": "CVE-2025-21814",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ptp: Ensure info-\u003eenable callback is always set",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21814"
},
{
"cve": "CVE-2025-21826",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: nf_tables: reject mismatching sum of field_len with set key length. The field length description provides the length of each separated key field in the concatenation, each field gets rounded up to 32-bits to calculate the pipapo rule width from pipapo_init(). The set key length provides the total size of the key aligned to 32-bits. Register-based arithmetics still allows for combining mismatching set key length and field length description, eg. set key length 10 and field description [ 5, 4 ] leading to pipapo width of 12.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21826"
},
{
"cve": "CVE-2025-21835",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: gadget: f_midi: fix MIDI Streaming descriptor lengths",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21835"
},
{
"cve": "CVE-2025-21844",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "smb: client: Add check for next_buffer in receive_encrypted_standard()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21844"
},
{
"cve": "CVE-2025-21846",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "acct: perform last write from workqueue",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21846"
},
{
"cve": "CVE-2025-21858",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "geneve: Fix use-after-free in geneve_find_dev()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21858"
},
{
"cve": "CVE-2025-21859",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "USB: gadget: f_midi: f_midi_complete to call queue_work",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21859"
},
{
"cve": "CVE-2025-21862",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "drop_monitor: incorrect initialization order. If drop_monitor is built as a kernel module, syzkaller may have time to send a netlink NET_DM_CMD_START message during the module loading. This will call the net_dm_monitor_start() function that uses a spinlock that has not yet been initialized.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21862"
},
{
"cve": "CVE-2025-21865",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Commit eb28fd76c0a0 (\"gtp: Destroy device along with udp socket\u0027s netns dismantle.\") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl() to destroy devices in each netns as done in geneve and ip tunnels. However, this could trigger -\u003edellink() twice for the same device during -\u003eexit_batch_rtnl().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2025-21865"
}
]
}
msrc_cve-2022-43945
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-43945 The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-43945.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"tracking": {
"current_release_date": "2022-11-09T00:00:00.000Z",
"generator": {
"date": "2025-10-20T00:04:34.204Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-43945",
"initial_release_date": "2022-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2022-11-09T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 kernel 5.10.158.1-1",
"product": {
"name": "\u003ccm1 kernel 5.10.158.1-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 kernel 5.10.158.1-1",
"product": {
"name": "cm1 kernel 5.10.158.1-1",
"product_id": "18518"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kernel 5.15.82.1-1",
"product": {
"name": "\u003ccbl2 kernel 5.15.82.1-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 kernel 5.15.82.1-1",
"product": {
"name": "cbl2 kernel 5.15.82.1-1",
"product_id": "18532"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 kernel 5.10.158.1-1 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 kernel 5.10.158.1-1 as a component of CBL Mariner 1.0",
"product_id": "18518-16820"
},
"product_reference": "18518",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kernel 5.15.82.1-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kernel 5.15.82.1-1 as a component of CBL Mariner 2.0",
"product_id": "18532-17086"
},
"product_reference": "18532",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "general",
"text": "SNPS",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18518-16820",
"18532-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-43945 The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-43945.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-09T00:00:00.000Z",
"details": "5.10.158.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2022-11-09T00:00:00.000Z",
"details": "5.15.82.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
]
}
ghsa-42x7-fjc5-38vr
Vulnerability from github
The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{
"affected": [],
"aliases": [
"CVE-2022-43945"
],
"database_specific": {
"cwe_ids": [
"CWE-770"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-11-04T19:15:00Z",
"severity": "HIGH"
},
"details": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"id": "GHSA-42x7-fjc5-38vr",
"modified": "2022-11-07T19:00:17Z",
"published": "2022-11-05T12:00:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945"
},
{
"type": "WEB",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20221215-0006"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2022-43945
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2022-43945",
"id": "GSD-2022-43945",
"references": [
"https://advisories.mageia.org/CVE-2022-43945.html",
"https://access.redhat.com/errata/RHSA-2022:8973",
"https://access.redhat.com/errata/RHSA-2022:8974",
"https://access.redhat.com/errata/RHSA-2022:9082",
"https://www.suse.com/security/cve/CVE-2022-43945.html",
"https://ubuntu.com/security/CVE-2022-43945",
"https://access.redhat.com/errata/RHSA-2023:0300",
"https://access.redhat.com/errata/RHSA-2023:0334",
"https://access.redhat.com/errata/RHSA-2023:0348",
"https://access.redhat.com/errata/RHSA-2023:0832",
"https://access.redhat.com/errata/RHSA-2023:0839",
"https://access.redhat.com/errata/RHSA-2023:0854"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-43945"
],
"details": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"id": "GSD-2022-43945",
"modified": "2023-12-13T01:19:31.972940Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "disclosure@synopsys.com",
"ID": "CVE-2022-43945",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "linux_kernel",
"version": {
"version_data": [
{
"version_value": "\u003c 6.0.2"
}
]
}
}
]
},
"vendor_name": "linux"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-131: Incorrect Calculation of Buffer Size"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
},
{
"name": "https://security.netapp.com/advisory/ntap-20221215-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
},
{
"name": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.19.17",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.0.2",
"versionStartIncluding": "6.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "disclosure@synopsys.com",
"ID": "CVE-2022-43945"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
"refsource": "MISC",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
},
{
"name": "https://security.netapp.com/advisory/ntap-20221215-0006/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
},
{
"name": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html",
"refsource": "MISC",
"tags": [],
"url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-03-08T18:15Z",
"publishedDate": "2022-11-04T19:15Z"
}
}
}
ssa-265688
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1.\n\nSiemens is preparing fix versions and recommends specific countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-265688.html"
},
{
"category": "self",
"summary": "SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-265688.json"
}
],
"title": "SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1",
"tracking": {
"current_release_date": "2025-10-14T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-265688",
"initial_release_date": "2024-04-09T00:00:00Z",
"revision_history": [
{
"date": "2024-04-09T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-05-14T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2024-2511"
},
{
"date": "2024-07-09T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2024-5535"
},
{
"date": "2024-11-12T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added CVE-2024-9143"
},
{
"date": "2025-03-11T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added CVE-2024-36484, CVE-2024-36902, CVE-2024-36904, CVE-2024-36905, CVE-2024-36916, CVE-2024-36929, CVE-2024-36939, CVE-2024-36940, CVE-2024-36959, CVE-2024-44987, CVE-2024-44989, CVE-2024-44990, CVE-2024-45016, CVE-2024-45018, CVE-2024-46679, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46750, CVE-2024-46759, CVE-2024-46783, CVE-2024-47660, CVE-2024-50299, CVE-2024-50301, CVE-2024-53101"
},
{
"date": "2025-04-08T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added CVE-2024-50302 (incl. product-specific impact description) and multiple other CVEs"
},
{
"date": "2025-06-10T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added 63 CVEs"
},
{
"date": "2025-07-08T00:00:00Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added 71 CVEs"
},
{
"date": "2025-08-12T00:00:00Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Added 147 CVEs"
},
{
"date": "2025-09-09T00:00:00Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Added 51 CVEs"
},
{
"date": "2025-10-14T00:00:00Z",
"legacy_version": "2.0",
"number": "11",
"summary": "Added CVE-2025-9230, CVE-2023-50781, CVE-2023-6129, CVE-2023-6237, CVE-2024-0727"
}
],
"status": "interim",
"version": "11"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC S7-1500 TM MFP - GNU/Linux subsystem",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP - GNU/Linux subsystem"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4090",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-4090"
},
{
"cve": "CVE-2021-38202",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-38202"
},
{
"cve": "CVE-2021-47002",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "SUNRPC: null pointer dereference in svc_rqst_free(). When alloc_pages_node() returns null in svc_rqst_alloc(), the null rq_scratch_page pointer will be dereferenced when calling put_page() in svc_rqst_free().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-47002"
},
{
"cve": "CVE-2021-47107",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "NFSD: READDIR buffer overflow. If a client sends a READDIR count argument that is too small (say, zero), then the buffer size calculation in the new init_dirlist helper functions results in an underflow, allowing the XDR stream functions to write beyond the actual buffer. This calculation has always been suspect. NFSD has never sanity- checked the READDIR count argument, but the old entry encoders managed the problem correctly. With the commits below, entry encoding changed, exposing the underflow to the pointer arithmetic in xdr_reserve_space(). Modern NFS clients attempt to retrieve as much data as possible for each READDIR request.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-47107"
},
{
"cve": "CVE-2021-47316",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfsd: NULL dereference in nfs3svc_encode_getaclres.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-47316"
},
{
"cve": "CVE-2022-38096",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file \u0027/dev/dri/renderD128 (or Dxxx)\u0027. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-43945",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-48827",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "NFSD: vulnerability caused by loff_t overflow on the server when a client reads near the maximum offset, causing the server to return an EINVAL error, which the client retries indefinitely, instead of handling out-of-range READ requests by returning a short result with an EOF flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-48827"
},
{
"cve": "CVE-2022-48828",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NFSD: Vulnerability caused by an underflow in ia_size due to a mismatch between signed and unsigned 64-bit file size values, which can cause issues when handling large file sizes from NFS clients.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-48828"
},
{
"cve": "CVE-2022-48829",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"notes": [
{
"category": "summary",
"text": "NFSD: Vulnerability handling large file sizes for NFSv3 improperly capping client size values larger than s64_max, leading to unexpected behavior and potential data corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-48829"
},
{
"cve": "CVE-2023-1652",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-1652"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-6121",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6121"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions.\r\n\r\nIf an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences.\r\n\r\nThe POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions.\r\n\r\nThe consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However unless the compiler uses the vector registers for storing pointers, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service.\r\n\r\nThe POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3. If this cipher is enabled on the server a malicious client can influence whether this AEAD cipher is used. This implies that TLS server applications using OpenSSL can be potentially impacted. However\r\nwe are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-6237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Checking excessively long invalid RSA public keys may take a long time. Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that application is also vulnerable if used with the \u0027-pubin\u0027 and \u0027-check\u0027 options on untrusted data. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6237"
},
{
"cve": "CVE-2023-6817",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6817"
},
{
"cve": "CVE-2023-6931",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-28746",
"cwe": {
"id": "CWE-1342",
"name": "Information Exposure through Microarchitectural State after Transient Execution"
},
"notes": [
{
"category": "summary",
"text": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-45898",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-45898"
},
{
"cve": "CVE-2023-47233",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-47233"
},
{
"cve": "CVE-2023-50781",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-50781"
},
{
"cve": "CVE-2023-52447",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Defer the free of inner map when necessary when updating or deleting an inner map in map array or map htab, the map may still be accessed by non-sleepable program or sleepable program. However bpf_map_fd_put_ptr() decreases the ref-counter of the inner map directly through bpf_map_put(), if the ref-counter is the last one (which is true for most cases), the inner map will be freed by ops-\u003emap_free() in a kworker. But for now, most .map_free() callbacks don\u0027t use synchronize_rcu() or its variants to wait for the elapse of a RCU grace period, so after the invocation of ops-\u003emap_free completes, the bpf program which is accessing the inner map may incur use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-52447"
},
{
"cve": "CVE-2023-52458",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock: add check that partition length needs to be aligned with block size",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-52458"
},
{
"cve": "CVE-2023-52614",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nPM / devfreq: Fix buffer overflow in trans_stat_show",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-52614"
},
{
"cve": "CVE-2023-52620",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: disallow timeout for anonymous sets\r\n\r\nNever used from userspace, disallow these parameters.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-52620"
},
{
"cve": "CVE-2024-0584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0584"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions. An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Use of the low-level GF(2m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named curves\" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2m)) curves that can\u0027t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an \"exotic\" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with \"exotic\" explicit binary (GF(2m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-22099",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.\n\nThis issue affects Linux kernel: v2.6.12-rc2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-22099"
},
{
"cve": "CVE-2024-23307",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-23307"
},
{
"cve": "CVE-2024-23848",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-23848"
},
{
"cve": "CVE-2024-24857",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s net/bluetooth device driver in conn_info_{min,max}_age_set() function. This can result in integrity overflow issue, possibly leading to bluetooth connection abnormality or denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-24857"
},
{
"cve": "CVE-2024-24858",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s net/bluetooth in {conn,adv}_{min,max}_interval_set() function. This can result in I2cap connection or broadcast abnormality issue, possibly leading to denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-24858"
},
{
"cve": "CVE-2024-24859",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s net/bluetooth in sniff_{min,max}_interval_set() function. This can result in a bluetooth sniffing exception issue, possibly leading denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-24859"
},
{
"cve": "CVE-2024-25739",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt to allocate zero bytes, and crash, because of a missing check for ubi-\u003eleb_size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-25739"
},
{
"cve": "CVE-2024-26629",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"notes": [
{
"category": "summary",
"text": "nfsd: The test on so_count in nfsd4_release_lockowner() is potentially harmful. It can transiently return a false positive resulting in a return of NFS4ERR_LOCKS_HELD when in fact no locks are held. This is clearly a protocol violation and with the Linux NFS client it can cause incorrect behaviour.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26629"
},
{
"cve": "CVE-2024-26642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: disallow anonymous set with timeout flag",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26642"
},
{
"cve": "CVE-2024-26643",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26643"
},
{
"cve": "CVE-2024-26651",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "sr9800: Local Denial of Service Vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26651"
},
{
"cve": "CVE-2024-26659",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "xhci: isoc Babble and Buffer Overrun events are not handled properly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26659"
},
{
"cve": "CVE-2024-26787",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "mmc: mmci: stm32: Fixed issue with overlapping mappings in the DMA API.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26787"
},
{
"cve": "CVE-2024-26810",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nvfio/pci: Lock external INTx masking ops",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26810"
},
{
"cve": "CVE-2024-26812",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nvfio/pci: Create persistent INTx handler",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26812"
},
{
"cve": "CVE-2024-26816",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"notes": [
{
"category": "summary",
"text": "x86, relocs: relocations in .notes section. When building with CONFIG_XEN_PV=y, .text symbols are emitted into the .notes section so that Xen can find the \"startup_xen\" entry point.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26816"
},
{
"cve": "CVE-2024-26820",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26820"
},
{
"cve": "CVE-2024-26851",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: nf_conntrack_h323: Add protection for bmp length out of range.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26851"
},
{
"cve": "CVE-2024-26852",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/ipv6: possible UAF in ip6_route_mpath_notify().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26852"
},
{
"cve": "CVE-2024-26855",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26855"
},
{
"cve": "CVE-2024-26859",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/bnx2x: Race condition leading to system crash during EEH error handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26859"
},
{
"cve": "CVE-2024-26861",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wireguard: receive: data-race around receiving_counter.counter.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26861"
},
{
"cve": "CVE-2024-26863",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in hsr_get_node().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26863"
},
{
"cve": "CVE-2024-26870",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26870"
},
{
"cve": "CVE-2024-26872",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "RDMA/srpt: use-after-free Write in srpt_refresh_port().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26872"
},
{
"cve": "CVE-2024-26875",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "media: pvrusb2: fix uaf in pvr2_context_set_notify.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26875"
},
{
"cve": "CVE-2024-26877",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "crypto: xilinx - call finalize with bh disabled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26877"
},
{
"cve": "CVE-2024-26878",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: quota: Fix potential NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26878"
},
{
"cve": "CVE-2024-26880",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26880"
},
{
"cve": "CVE-2024-26882",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26882"
},
{
"cve": "CVE-2024-26883",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Fix stackmap overflow check on 32-bit arches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26883"
},
{
"cve": "CVE-2024-26884",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Fix hashtab overflow check on 32-bit arches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26884"
},
{
"cve": "CVE-2024-26885",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbpf: Fix DEVMAP_HASH overflow check on 32-bit arches\r\n\r\nThe devmap code allocates a number hash buckets equal to the next power\r\nof two of the max_entries value provided when creating the map. When\r\nrounding up to the next power of two, the 32-bit variable storing the\r\nnumber of buckets can overflow, and the code checks for overflow by\r\nchecking if the truncated 32-bit value is equal to 0. However, on 32-bit\r\narches the rounding up itself can overflow mid-way through, because it\r\nends up doing a left-shift of 32 bits on an unsigned long value. If the\r\nsize of an unsigned long is four bytes, this is undefined behaviour, so\r\nthere is no guarantee that we\u0027ll end up with a nice and tidy 0-value at\r\nthe end.\r\n\r\nSyzbot managed to turn this into a crash on arm32 by creating a\r\nDEVMAP_HASH with max_entries \u003e 0x80000000 and then trying to update it.\r\nFix this by moving the overflow check to before the rounding up\r\noperation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26885"
},
{
"cve": "CVE-2024-26889",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: hci_core: Fix possible buffer overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26889"
},
{
"cve": "CVE-2024-26891",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "iommu/vt-d: Don\u0027t issue ATS Invalidation request when device is disconnected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26891"
},
{
"cve": "CVE-2024-26894",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26894"
},
{
"cve": "CVE-2024-26895",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26895"
},
{
"cve": "CVE-2024-26897",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26897"
},
{
"cve": "CVE-2024-26898",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26898"
},
{
"cve": "CVE-2024-26901",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26901"
},
{
"cve": "CVE-2024-26903",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: rfcomm: Fixed null-ptr-deref in rfcomm_check_security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26903"
},
{
"cve": "CVE-2024-26906",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26906"
},
{
"cve": "CVE-2024-26907",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "RDMA/mlx5: Fixed fortify source warning while accessing Eth segment.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26907"
},
{
"cve": "CVE-2024-26920",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntracing/trigger: Fix to return error if failed to alloc snapshot",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26923",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26923"
},
{
"cve": "CVE-2024-26925",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The commit mutex should not be released during the critical section between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC worker could collect expired objects and get the released commit lock within the same GC sequence. nf_tables_module_autoload() temporarily releases the mutex to load module dependencies, then it goes back to replay the transaction again. Move it at the end of the abort phase after nft_gc_seq_end() is called.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-26934",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nUSB: core: Fix deadlock in usb_deauthorize_interface()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26934"
},
{
"cve": "CVE-2024-26935",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: core: Fix unremoved procfs host directory regression",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26935"
},
{
"cve": "CVE-2024-26937",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/i915/gt: Reset queue_priority_hint on parking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26937"
},
{
"cve": "CVE-2024-26950",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwireguard: netlink: access device through ctx instead of peer",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26950"
},
{
"cve": "CVE-2024-26951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwireguard: netlink: check for dangling peer via is_dead instead of empty list",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26951"
},
{
"cve": "CVE-2024-26958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfs: fix UAF in direct writes",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26960",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm: swap: fix race between free_swap_and_cache() and swapoff()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26960"
},
{
"cve": "CVE-2024-26961",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmac802154: fix llsec key resources release in mac802154_llsec_key_del",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26961"
},
{
"cve": "CVE-2024-26973",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: fat: fix uninitialized field in nostale filehandles When fat_encode_fh_nostale() encodes file handle without a parent it stores only first 10 bytes of the file handle. However the length of the file handle must be a multiple of 4 so the file handle is actually 12 bytes long and the last two bytes remain uninitialized. This is not great at we potentially leak uninitialized information with the handle to userspace. Properly initialize the full handle length.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26973"
},
{
"cve": "CVE-2024-26974",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncrypto: qat - resolve race condition during AER recovery",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26974"
},
{
"cve": "CVE-2024-26982",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\nSquashfs: check the inode number is not the invalid value of zero",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26982"
},
{
"cve": "CVE-2024-26988",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninit/main.c: Fix potential static_command_line memory overflow",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26988"
},
{
"cve": "CVE-2024-26993",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs: sysfs: Fix reference leak in sysfs_break_active_protection()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26993"
},
{
"cve": "CVE-2024-27004",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: Get runtime PM before walking tree during disable_unused",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27004"
},
{
"cve": "CVE-2024-27013",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntun: limit printing rate when illegal packet received by tun dev\r\n\r\nvhost_worker will call tun call backs to receive packets. If too many\r\nillegal packets arrives, tun_do_read will keep dumping packet contents.\r\nWhen console is enabled, it will costs much more cpu time to dump\r\npacket and soft lockup will be detected.\r\n\r\nnet_ratelimit mechanism can be used to limit the dumping rate.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27013"
},
{
"cve": "CVE-2024-27020",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in nft_expr_type_get().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27020"
},
{
"cve": "CVE-2024-27024",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Linux kernel: net/rds: WARNING in rds_conn_connect_if_down If connection isn\u0027t established yet, get_mr() will fail, trigger connection after get_mr().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27024"
},
{
"cve": "CVE-2024-27025",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: nbd: null check for nla_nest_start nla_nest_start() may fail and return NULL. Insert a check and set errno based on other call sites within the same source code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27025"
},
{
"cve": "CVE-2024-27038",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: clk: clk_core_get NULL dereference It is possible for clk_core_get to dereference a NULL in the following sequence: clk_core_get() of_clk_get_hw_from_clkspec() __of_clk_get_hw_from_provider() __clk_get_hw() __clk_get_hw() can return NULL which is dereferenced by clk_core_get() at hw-\u003ecore. Prior to commit dde4eff47c82 (\"clk: Look for parents with clkdev based clk_lookups\") the check IS_ERR_OR_NULL() was performed which would have caught the NULL. Reading the description of this function it talks about returning NULL but that cannot be so at the moment. Update the function to check for hw before dereferencing it and return NULL if hw is NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27038"
},
{
"cve": "CVE-2024-27047",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerablity in Linux kernel: net: phy: phy_get_internal_delay accessing an empty array The phy_get_internal_delay function could try to access to an empty array in the case that the driver is calling phy_get_internal_delay without defining delay_values and rx-internal-delay-ps or tx-internal-delay-ps is defined to 0 in the device-tree. This will lead to \"unable to handle kernel NULL pointer dereference at virtual address 0\".",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27047"
},
{
"cve": "CVE-2024-27052",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work The workqueue might still be running, when the driver is stopped.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27052"
},
{
"cve": "CVE-2024-27053",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Linux kernel: wifi: wilc1000: RCU usage in connect path",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27053"
},
{
"cve": "CVE-2024-27059",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands. The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0. While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device\u0027s ID\ninformation is 0. This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27059"
},
{
"cve": "CVE-2024-27065",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not compare internal table flags on updates Restore skipping transaction if table update does not modify flags.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27065"
},
{
"cve": "CVE-2024-27072",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: usbtv: Remove useless locks in usbtv_video_free()\r\n\r\nRemove locks calls in usbtv_video_free() because\r\nare useless and may led to a deadlock as reported here:\r\nhttps://syzkaller.appspot.com/x/bisect.txt?x=166dc872180000\r\nAlso remove usbtv_stop() call since it will be called when\r\nunregistering the device.\r\n\r\nBefore \u0027c838530d230b\u0027 this issue would only be noticed if you\r\ndisconnect while streaming and now it is noticeable even when\r\ndisconnecting while not streaming.\r\n\r\n\r\n[hverkuil: fix minor spelling mistake in log message]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27072"
},
{
"cve": "CVE-2024-27076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Linux kernel: media: imx: csc/scaler: v4l2_ctrl_handler memory leak Free the memory allocated in v4l2_ctrl_handler_init on release.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27076"
},
{
"cve": "CVE-2024-27077",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: media: v4l2-mem2mem: a memleak in v4l2_m2m_register_entity The entity-\u003ename (i.e. name) is allocated in v4l2_m2m_register_entity but isn\u0027t freed in its following error-handling paths. This patch adds such deallocation to prevent memleak of entity-\u003ename.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27077"
},
{
"cve": "CVE-2024-27078",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: media: v4l2-tpg: some memleaks in tpg_alloc In tpg_alloc, resources should be deallocated in each and every error-handling paths, since they are allocated in for statements. Otherwise there would be memleaks because tpg_free is called only when tpg_alloc return 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27078"
},
{
"cve": "CVE-2024-27395",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: Fix Use-After-Free in ovs_ct_exit\n\nSince kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof ovs_ct_limit_exit, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27395"
},
{
"cve": "CVE-2024-27396",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27397",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: use timestamp to check for set element timeout\r\n\r\nAdd a timestamp field at the beginning of the transaction, store it\r\nin the nftables per-netns area.\r\n\r\nUpdate set backend .insert, .deactivate and sync gc path to use the\r\ntimestamp, this avoids that an element expires while control plane\r\ntransaction is still unfinished.\r\n\r\n.lookup and .update, which are used from packet path, still use the\r\ncurrent time to check if the element has expired. And .get path and dump\r\nalso since this runs lockless under rcu read size lock. Then, there is\r\nasync gc which also needs to check the current time since it runs\r\nasynchronously from a workqueue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27397"
},
{
"cve": "CVE-2024-27419",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netrom: data-races around sysctl_net_busy_read We need to protect the reader reading the sysctl value because the value can be changed concurrently.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27419"
},
{
"cve": "CVE-2024-27431",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program When running an XDP program that is attached to a cpumap entry, we don\u0027t initialise the xdp_rxq_info data structure being used in the xdp_buff that backs the XDP program invocation. Tobias noticed that this leads to random values being returned as the xdp_md-\u003erx_queue_index value for XDP programs running in a cpumap. This means we\u0027re basically returning the contents of the uninitialised memory, which is bad. Fix this by zero-initialising the rxq data structure before running the XDP program.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27431"
},
{
"cve": "CVE-2024-27436",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Stop parsing channels bits when all channels are found. If a usb audio device sets more bits than the amount of channels it could write outside of the map array.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27436"
},
{
"cve": "CVE-2024-27437",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Disable auto-enable of exclusive INTx IRQ\n\nCurrently for devices requiring masking at the irqchip for INTx, ie.\ndevices without DisINTx support, the IRQ is enabled in request_irq()\nand subsequently disabled as necessary to align with the masked status\nflag. This presents a window where the interrupt could fire between\nthese events, resulting in the IRQ incrementing the disable depth twice.\nThis would be unrecoverable for a user since the masked flag prevents\nnested enables through vfio.\n\nInstead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx\nis never auto-enabled, then unmask as required.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27437"
},
{
"cve": "CVE-2024-33621",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipvlan: Dont Use skb-\u003esk in ipvlan_process_v4 / 6_outbound.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-33621"
},
{
"cve": "CVE-2024-33847",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "f2fs: compress: Released compress inode f2fs image may be corrupted. The reason is partial truncation assume compressed inode has reserved blocks, after partial truncation, valid block count may change w/o .i_blocks and .total_valid_block_count update, resulting in corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-33847"
},
{
"cve": "CVE-2024-34027",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "f2fs: compress: filesystem metadata including blkaddr in dnode, inode fields and .total_valid_block_count may be corrupted after SPO case.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-34027"
},
{
"cve": "CVE-2024-35789",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\r\n\r\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\r\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\r\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\r\nafter the VLAN change.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35805",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndm snapshot: fix lockup in dm_exception_table_exit\r\n\r\nThere was reported lockup when we exit a snapshot with many exceptions.\r\nFix this by adding \"cond_resched\" to the loop that frees the exceptions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35805"
},
{
"cve": "CVE-2024-35807",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35807"
},
{
"cve": "CVE-2024-35811",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35811"
},
{
"cve": "CVE-2024-35813",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmmc: core: Avoid negative index with array access\r\n\r\nCommit 4d0c8d0aef63 (\"mmc: core: Use mrq.sbc in close-ended ffu\") assigns\r\nprev_idata = idatas[i - 1], but doesn\u0027t check that the iterator i is\r\ngreater than zero. Let\u0027s fix this by adding a check.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35813"
},
{
"cve": "CVE-2024-35815",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion\r\n\r\nThe first kiocb_set_cancel_fn() argument may point at a struct kiocb\r\nthat is not embedded inside struct aio_kiocb. With the current code,\r\ndepending on the compiler, the req-\u003eki_ctx read happens either before\r\nthe IOCB_AIO_RW test or after that test. Move the req-\u003eki_ctx read such\r\nthat it is guaranteed that the IOCB_AIO_RW test happens first.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35815"
},
{
"cve": "CVE-2024-35823",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nvt: fix unicode buffer corruption when deleting characters\r\n\r\nThis is the same issue that was fixed for the VGA text buffer in commit\r\n39cdb68c64d8 (\"vt: fix memory overlapping when deleting chars in the\r\nbuffer\"). The cure is also the same i.e. replace memcpy() with memmove()\r\ndue to the overlaping buffers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35823"
},
{
"cve": "CVE-2024-35828",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: some memleaks in lbs_allocate_cmd_buffer() In the for statement of lbs_allocate_cmd_buffer(), if the allocation of cmdarray[i].cmdbuf fails, both cmdarray and cmdarray[i].cmdbuf needs to be freed. Otherwise, there will be memleaks in lbs_allocate_cmd_buffer().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35828"
},
{
"cve": "CVE-2024-35845",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: iwlwifi: dbg-tlv: ensure NUL termination The iwl_fw_ini_debug_info_tlv is used as a string, so we must ensure the string is terminated correctly before using it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35845"
},
{
"cve": "CVE-2024-35849",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: fix information leak in btrfs_ioctl_logical_to_ino()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35849"
},
{
"cve": "CVE-2024-35877",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/mm/pat: fix VM_PAT handling in COW mappings\r\n\r\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\r\nin fact, all PTEs) can be replaced during write faults to point at anon\r\nfolios. Reliably recovering the correct PFN and cachemode using\r\nfollow_phys() from PTEs will not work in COW mappings.\r\n\r\nUsing follow_phys(), we might just get the address+protection of the anon\r\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\r\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\r\ntrack_pfn_copy(), not properly calling free_pfn_range().\r\n\r\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\r\nit with the wrong range, possibly leaking memory.\r\n\r\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\r\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\r\nif we run into that.\r\n\r\nWe will now properly handle untrack_pfn() with COW mappings, where we\r\ndon\u0027t need the cachemode. We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\r\nthe first page was replaced by an anon folio, though: we\u0027d have to store\r\nthe cachemode in the VMA to make this work, likely growing the VMA size.\r\n\r\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\r\ncase: it would have failed in the past with swap/nonswap entries already,\r\nand it would have done the wrong thing with anon folios.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35877"
},
{
"cve": "CVE-2024-35884",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nudp: do not accept non-tunnel GSO skbs landing in a tunnel\r\n\r\nWhen rx-udp-gro-forwarding is enabled UDP packets might be GROed when\r\nbeing forwarded. If such packets might land in a tunnel this can cause\r\nvarious issues and udp_gro_receive makes sure this isn\u0027t the case by\r\nlooking for a matching socket. This is performed in\r\nudp4/6_gro_lookup_skb but only in the current netns. This is an issue\r\nwith tunneled packets when the endpoint is in another netns. In such\r\ncases the packets will be GROed at the UDP level, which leads to various\r\nissues later on. The same thing can happen with rx-gro-list.\r\n\r\nWe saw this with geneve packets being GROed at the UDP level. In such\r\ncase gso_size is set; later the packet goes through the geneve rx path,\r\nthe geneve header is pulled, the offset are adjusted and frag_list skbs\r\nare not adjusted with regard to geneve. When those skbs hit\r\nskb_fragment, it will misbehave. Different outcomes are possible\r\ndepending on what the GROed skbs look like; from corrupted packets to\r\nkernel crashes.\r\n\r\nOne example is a BUG_ON[1] triggered in skb_segment while processing the\r\nfrag_list. Because gso_size is wrong (geneve header was pulled)\r\nskb_segment thinks there is \"geneve header size\" of data in frag_list,\r\nalthough it\u0027s in fact the next packet. The BUG_ON itself has nothing to\r\ndo with the issue. This is only one of the potential issues.\r\n\r\nLooking up for a matching socket in udp_gro_receive is fragile: the\r\nlookup could be extended to all netns (not speaking about performances)\r\nbut nothing prevents those packets from being modified in between and we\r\ncould still not find a matching socket. It\u0027s OK to keep the current\r\nlogic there as it should cover most cases but we also need to make sure\r\nwe handle tunnel packets being GROed too early.\r\n\r\nThis is done by extending the checks in udp_unexpected_gso: GSO packets\r\nlacking the SKB_GSO_UDP_TUNNEL/_CSUM bits and landing in a tunnel must\r\nbe segmented.\r\n\r\n[1] kernel BUG at net/core/skbuff.c:4408!\r\n RIP: 0010:skb_segment+0xd2a/0xf70\r\n __udp_gso_segment+0xaa/0x560",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35884"
},
{
"cve": "CVE-2024-35886",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: Fix infinite recursion in fib6_dump_done().\r\n\r\nsyzkaller reported infinite recursive calls of fib6_dump_done() during\r\nnetlink socket destruction.\r\n\r\nFrom the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then\r\nthe response was generated. The following recvmmsg() resumed the dump\r\nfor IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due\r\nto the fault injection.\r\n\r\n 12:01:34 executing program 3:\r\n r0 = socket$nl_route(0x10, 0x3, 0x0)\r\n sendmsg$nl_route(r0, ... snip ...)\r\n recvmmsg(r0, ... snip ...) (fail_nth: 8)\r\n\r\nHere, fib6_dump_done() was set to nlk_sk(sk)-\u003ecb.done, and the next call\r\nof inet6_dump_fib() set it to nlk_sk(sk)-\u003ecb.args[3]. syzkaller stopped\r\nreceiving the response halfway through, and finally netlink_sock_destruct()\r\ncalled nlk_sk(sk)-\u003ecb.done().\r\n\r\nfib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)-\u003ecb.done() if it\r\nis still not NULL. fib6_dump_end() rewrites nlk_sk(sk)-\u003ecb.done() by\r\nnlk_sk(sk)-\u003ecb.args[3], but it has the same function, not NULL, calling\r\nitself recursively and hitting the stack guard page.\r\n\r\nTo avoid the issue, let\u0027s set the destructor after kzalloc().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35886"
},
{
"cve": "CVE-2024-35888",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: erspan: make sure erspan_base_hdr is present in skb-\u003ehead.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35888"
},
{
"cve": "CVE-2024-35893",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/sched: act_skbmod: prevent kernel-infoleak\r\n\r\nsyzbot found that tcf_skbmod_dump() was copying four bytes\r\nfrom kernel stack to user space.\r\n\r\nThe issue here is that \u0027struct tc_skbmod\u0027 has a four bytes hole.\r\n\r\nWe need to clear the structure before filling fields.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35893"
},
{
"cve": "CVE-2024-35895",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n CPU0 CPU1\n ---- ----\n lock(\u0026htab-\u003ebuckets[i].lock);\n local_irq_disable();\n lock(\u0026host-\u003elock);\n lock(\u0026htab-\u003ebuckets[i].lock);\n \u003cInterrupt\u003e\n lock(\u0026host-\u003elock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35895"
},
{
"cve": "CVE-2024-35896",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: validate user input for expected length\r\n\r\nI got multiple syzbot reports showing old bugs exposed\r\nby BPF after commit 20f2505fb436 (\"bpf: Try to avoid kzalloc\r\nin cgroup/{s,g}etsockopt\")\r\n\r\nsetsockopt() @optlen argument should be taken into account\r\nbefore copying data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35896"
},
{
"cve": "CVE-2024-35897",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: discard table flag update with pending basechain deletion\r\n\r\nHook unregistration is deferred to the commit phase, same occurs with\r\nhook updates triggered by the table dormant flag. When both commands are\r\ncombined, this results in deleting a basechain while leaving its hook\r\nstill registered in the core.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35897"
},
{
"cve": "CVE-2024-35898",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()\r\n\r\nnft_unregister_flowtable_type() within nf_flow_inet_module_exit() can\r\nconcurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().\r\nAnd thhere is not any protection when iterate over nf_tables_flowtables\r\nlist in __nft_flowtable_type_get(). Therefore, there is pertential\r\ndata-race of nf_tables_flowtables list entry.\r\n\r\nUse list_for_each_entry_rcu() to iterate over nf_tables_flowtables list\r\nin __nft_flowtable_type_get(), and use rcu_read_lock() in the caller\r\nnft_flowtable_type_get() to protect the entire type query process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35898"
},
{
"cve": "CVE-2024-35899",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: flush pending destroy work before exit_net release\r\n\r\nSimilar to 2c9f0293280e (\"netfilter: nf_tables: flush pending destroy\r\nwork before netlink notifier\") to address a race between exit_net and\r\nthe destroy workqueue.\r\n\r\nThe trace below shows an element to be released via destroy workqueue\r\nwhile exit_net path (triggered via module removal) has already released\r\nthe set that is used in such transaction.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35899"
},
{
"cve": "CVE-2024-35900",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: reject new basechain after table flag update\r\n\r\nWhen dormant flag is toggled, hooks are disabled in the commit phase by\r\niterating over current chains in table (existing and new).\r\n\r\nThe following configuration allows for an inconsistent state:\r\n\r\n add table x\r\n add chain x y { type filter hook input priority 0; }\r\n add table x { flags dormant; }\r\n add chain x w { type filter hook input priority 1; }\r\n\r\nwhich triggers the following warning when trying to unregister chain w\r\nwhich is already unregistered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35900"
},
{
"cve": "CVE-2024-35902",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/rds: possible cp null dereference cp might be null, calling cp-\u003ecp_conn would produce null dereference. Cp is a parameter of __rds_rdma_map and is not reassigned.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35902"
},
{
"cve": "CVE-2024-35905",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Protect against int overflow for stack access size\n\nThis patch re-introduces protection against the size of access to stack\nmemory being negative; the access size can appear negative as a result\nof overflowing its signed int representation. This should not actually\nhappen, as there are other protections along the way, but we should\nprotect against it anyway. One code path was missing such protections\n(fixed in the previous patch in the series), causing out-of-bounds array\naccesses in check_stack_range_initialized(). This patch causes the\nverification of a program with such a non-sensical access size to fail.\n\nThis check used to exist in a more indirect way, but was inadvertendly\nremoved in a833a17aeac7.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35905"
},
{
"cve": "CVE-2024-35910",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets We had various syzbot reports about tcp timers firing after the corresponding netns has been dismantled. Fortunately Josef Bacik could trigger the issue more often, and could test a patch I wrote two years ago. When TCP sockets are closed, we call inet_csk_clear_xmit_timers() to \u0027stop\u0027 the timers. inet_csk_clear_xmit_timers() can be called from any context, including when socket lock is held. This is the reason it uses sk_stop_timer(), aka del_timer(). This means that ongoing timers might finish much later. For user sockets, this is fine because each running timer holds a reference on the socket, and the user socket holds a reference on the netns. For kernel sockets, we risk that the netns is freed before timer can complete, because kernel sockets do not hold reference on the netns. This patch adds inet_csk_clear_xmit_timers_sync() function that using sk_stop_timer_sync() to make sure all timers are terminated before the kernel socket is released. Modules using kernel sockets close them in their netns exit() handler. Also add sock_not_owned_by_me() helper to get LOCKDEP support : inet_csk_clear_xmit_timers_sync() must not be called while socket lock is held. It is very possible we can revert in the future commit 3a58f13a881e (\"net: rds: acquire refcount on TCP sockets\") which attempted to solve the issue in rds only. (net/smc/af_smc.c and net/mptcp/subflow.c have similar code) We probably can remove the check_net() tests from tcp_out_of_resources() and __tcp_close() in the future.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35910"
},
{
"cve": "CVE-2024-35915",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35915"
},
{
"cve": "CVE-2024-35922",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "fbmon: prevent division by zero in fb_videomode_from_videomode()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35922"
},
{
"cve": "CVE-2024-35925",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "block: prevent division by zero in blk_rq_stat_sum()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35925"
},
{
"cve": "CVE-2024-35930",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35930"
},
{
"cve": "CVE-2024-35933",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: btintel: Fix null ptr deref in btintel_read_version",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35933"
},
{
"cve": "CVE-2024-35934",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35934"
},
{
"cve": "CVE-2024-35935",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "btrfs: send: handle path ref underflow in header iterate_inode_ref()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35935"
},
{
"cve": "CVE-2024-35936",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35936"
},
{
"cve": "CVE-2024-35940",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "pstore/zone: Add a null pointer check to the psz_kmsg_read",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35940"
},
{
"cve": "CVE-2024-35944",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35944"
},
{
"cve": "CVE-2024-35950",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "drm/client: Fully protect modes with dev-\u003emode_config.mutex",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35950"
},
{
"cve": "CVE-2024-35955",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "kprobes: Fix possible use-after-free issue on kprobe registration",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net: ena: Fix incorrect descriptor free behavior",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35958"
},
{
"cve": "CVE-2024-35960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "net/mlx5: Properly link new fs rules into the tree",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35960"
},
{
"cve": "CVE-2024-35962",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "summary",
"text": "netfilter: complete validation of user input",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35962"
},
{
"cve": "CVE-2024-35965",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: L2CAP: Fix not validating setsockopt user input\r\n\r\nCheck user input length before copying data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35965"
},
{
"cve": "CVE-2024-35966",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: RFCOMM: Fix not validating setsockopt user input",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35966"
},
{
"cve": "CVE-2024-35967",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: SCO: Fix not validating setsockopt user input",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35967"
},
{
"cve": "CVE-2024-35969",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35973",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "geneve: fix header validation in geneve_xmit_skb",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35973"
},
{
"cve": "CVE-2024-35976",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "xsk: validate user input for XDP_UMEM|COMPLETION_FILL_RING",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35976"
},
{
"cve": "CVE-2024-35978",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: Fix memory leak in hci_req_sync_complete()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35978"
},
{
"cve": "CVE-2024-35982",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "batman-adv: Avoid infinite loop trying to resize local TT",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35982"
},
{
"cve": "CVE-2024-35983",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35983"
},
{
"cve": "CVE-2024-35984",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "i2c: smbus: fix NULL function pointer dereference",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35984"
},
{
"cve": "CVE-2024-35988",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "riscv: Fix TASK_SIZE on 64-bit NOMMU. On NOMMU, userspace memory can come from anywhere in physical RAM. The current definition of TASK_SIZE is wrong if any RAM exists above 4G,\r\ncausing spurious failures in the userspace access routines.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35988"
},
{
"cve": "CVE-2024-35990",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "dma: xilinx_dpdma: Fix locking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35990"
},
{
"cve": "CVE-2024-35996",
"cwe": {
"id": "CWE-655",
"name": "Insufficient Psychological Acceptability"
},
"notes": [
{
"category": "summary",
"text": "cpu: Re-enable CPU mitigations by default for !X86 architectures",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35996"
},
{
"cve": "CVE-2024-35997",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35997"
},
{
"cve": "CVE-2024-36004",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "i40e: Do not use WQ_MEM_RECLAIM flag for workqueue",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36004"
},
{
"cve": "CVE-2024-36005",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: nf_tables: honor table dormant flag from netdev release event path",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36005"
},
{
"cve": "CVE-2024-36006",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmlxsw: spectrum_acl_tcam: Fix incorrect list API usage",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36006"
},
{
"cve": "CVE-2024-36007",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmlxsw: spectrum_acl_tcam: Fix warning during rehash\r\n\r\nAs previously explained, the rehash delayed work migrates filters from\r\none region to another. This is done by iterating over all chunks (all\r\nthe filters with the same priority) in the region and in each chunk\r\niterating over all the filters.\r\n\r\nWhen the work runs out of credits it stores the current chunk and entry\r\nas markers in the per-work context so that it would know where to resume\r\nthe migration from the next time the work is scheduled.\r\n\r\nUpon error, the chunk marker is reset to NULL, but without resetting the\r\nentry markers despite being relative to it. This can result in migration\r\nbeing resumed from an entry that does not belong to the chunk being\r\nmigrated. In turn, this will eventually lead to a chunk being iterated\r\nover as if it is an entry. Because of how the two structures happen to\r\nbe defined, this does not lead to KASAN splats, but to warnings such as.\r\n\r\nFix by creating a helper that resets all the markers and call it from\r\nall the places the currently only reset the chunk marker. For good\r\nmeasures also call it when starting a completely new rehash. Add a\r\nwarning to avoid future cases.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36007"
},
{
"cve": "CVE-2024-36008",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv4: check for NULL idev in ip_route_use_hint()\r\n\r\nsyzbot was able to trigger a NULL deref in fib_validate_source()\r\nin an old tree.\r\n\r\nIt appears the bug exists in latest trees.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36008"
},
{
"cve": "CVE-2024-36020",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni40e: fix vf may be used uninitialized in this function warning\r\n\r\nTo fix the regression introduced by commit 52424f974bc5, which causes\r\nservers hang in very hard to reproduce conditions with resets races.\r\nUsing two sources for the information is the root cause.\r\nIn this function before the fix bumping v didn\u0027t mean bumping vf\r\npointer. But the code used this variables interchangeably, so stale vf\r\ncould point to different/not intended vf.\r\n\r\nRemove redundant \"v\" variable and iterate via single VF pointer across\r\nwhole function instead to guarantee VF pointer validity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36020"
},
{
"cve": "CVE-2024-36270",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: tproxy: bail out if IP has been disabled on the device syzbot reports: general protection fault, probably for non-canonical address",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36270"
},
{
"cve": "CVE-2024-36286",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36286"
},
{
"cve": "CVE-2024-36288",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token-\u003epages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f].",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36288"
},
{
"cve": "CVE-2024-36484",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36484"
},
{
"cve": "CVE-2024-36489",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tls: missing memory barrier in tls_init. In tls_init(), a write memory barrier is missing, and store-store reordering may cause NULL dereference in tls_{setsockopt,getsockopt}.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36489"
},
{
"cve": "CVE-2024-36894",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36894"
},
{
"cve": "CVE-2024-36899",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngpiolib: cdev: Fix use after free in lineinfo_changed_notify\r\n\r\nThe use-after-free issue occurs as follows: when the GPIO chip device file\r\nis being closed by invoking gpio_chrdev_release(), watched_lines is freed\r\nby bitmap_free(), but the unregistration of lineinfo_changed_nb notifier\r\nchain failed due to waiting write rwsem. Additionally, one of the GPIO\r\nchip\u0027s lines is also in the release process and holds the notifier chain\u0027s\r\nread rwsem. Consequently, a race condition leads to the use-after-free of\r\nwatched_lines.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36899"
},
{
"cve": "CVE-2024-36902",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() syzbot is able to trigger the following crash [1], caused by unsafe ip6_dst_idev() use. Indeed ip6_dst_idev() can return NULL, and must always be checked.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36902"
},
{
"cve": "CVE-2024-36904",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36905",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36905"
},
{
"cve": "CVE-2024-36916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: blk-iocost: avoid out of bounds shift UBSAN catches undefined behavior in blk-iocost, where sometimes iocg-\u003edelay is shifted right by a number that is too large, resulting in undefined behavior on some architectures. [ 186.556576] ------------[ cut here ]------------ UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23 shift exponent 64 is too large for 64-bit type \u0027u64\u0027 (aka \u0027unsigned long long\u0027) CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S E N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1 Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020 Call Trace: \u003cIRQ\u003e dump_stack_lvl+0x8f/0xe0 __ubsan_handle_shift_out_of_bounds+0x22c/0x280 iocg_kick_delay+0x30b/0x310 ioc_timer_fn+0x2fb/0x1f80 __run_timer_base+0x1b6/0x250 ... Avoid that undefined behavior by simply taking the \"delay = 0\" branch if the shift is too large. I am not sure what the symptoms of an undefined value delay will be, but I suspect it could be more than a little annoying to debug.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36916"
},
{
"cve": "CVE-2024-36929",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: core: reject skb_copy(_expand) for fraglist GSO skbs SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become invalid. Return NULL if such an skb is passed to skb_copy or skb_copy_expand, in order to prevent a crash on a potential later call to skb_gso_segment.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36929"
},
{
"cve": "CVE-2024-36939",
"cwe": {
"id": "CWE-391",
"name": "Unchecked Error Condition"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: nfs: Handle error of rpc_proc_register() in nfs_net_init(). syzkaller reported a warning [0] triggered while destroying immature netns. rpc_proc_register() was called in init_nfs_fs(), but its error has been ignored since at least the initial commit 1da177e4c3f4 (\"Linux-2.6.12-rc2\"). Recently, commit d47151b79e32 (\"nfs: expose /proc/net/sunrpc/nfs in net namespaces\") converted the procfs to per-netns and made the problem more visible. Even when rpc_proc_register() fails, nfs_net_init() could succeed, and thus nfs_net_exit() will be called while destroying the netns. Then, remove_proc_entry() will be called for non-existing proc directory and trigger the warning below. Let\u0027s handle the error of rpc_proc_register() properly in nfs_net_init(). [0]: name \u0027nfs\u0027 WARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711 Modules linked in: CPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 RIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711 Code: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff \u003c0f\u003e 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb RSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286 RAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c RDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc R13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8 FS: 00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: \u003cTASK\u003e rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310 nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438 ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170 setup_net+0x46c/0x660 net/core/net_namespace.c:372 copy_net_ns+0x244/0x590 net/core/net_namespace.c:505 create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110 unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228 ksys_unshare+0x342/0x760 kernel/fork.c:3322 __do_sys_unshare kernel/fork.c:3393 [inline] __se_sys_unshare kernel/fork.c:3391 [inline] __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x46/0x4e RIP: 0033:0x7f30d0febe5d Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48 RSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600 RBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000 \u003c/TASK\u003e",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36939"
},
{
"cve": "CVE-2024-36940",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: pinctrl: core: delete incorrect free in pinctrl_enable() The \"pctldev\" struct is allocated in devm_pinctrl_register_and_init(). It\u0027s a devm_ managed pointer that is freed by devm_pinctrl_dev_release(), so freeing it in pinctrl_enable() will lead to a double free. The devm_pinctrl_dev_release() function frees the pindescs and destroys the mutex as well.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36959",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() If we fail to allocate propname buffer, we need to drop the reference count we just took. Because the pinctrl_dt_free_maps() includes the droping operation, here we call it directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36959"
},
{
"cve": "CVE-2024-36974",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP. If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev-\u003enum_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36974"
},
{
"cve": "CVE-2024-36978",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: sched: sch_multiq: possible OOB write in multiq_tune() q-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic after kmalloc. So the old q-\u003ebands should not be used in kmalloc. Otherwise, an out-of-bounds write will occur.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36978"
},
{
"cve": "CVE-2024-37356",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-37356"
},
{
"cve": "CVE-2024-38381",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfc: nci: Fix uninit-value in nci_rx_work syzbot reported the following uninit-value access issue [1] nci_rx_work() parses received packet from ndev-\u003erx_q. It should be validated header size, payload size and total packet size before processing the packet. If an invalid packet is detected, it should be silently discarded.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38381"
},
{
"cve": "CVE-2024-38547",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "media: atomisp: ssh_css: null-pointer dereference in load_video_binaries.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38547"
},
{
"cve": "CVE-2024-38552",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drm/amd/display: Fix potential index out of bounds in color transformation function Fixes index out of bounds issue in the color transformation function. The issue could occur when the index \u0027i\u0027 exceeds the number of transfer function points (TRANSFER_FUNC_POINTS). The fix adds a check to ensure \u0027i\u0027 is within bounds before accessing the transfer function points. If \u0027i\u0027 is out of bounds, an error message is logged and the function returns false to indicate an error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38552"
},
{
"cve": "CVE-2024-38558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: openvswitch: fix overwriting ct original tuple for ICMPv6 OVS_PACKET_CMD_EXECUTE has 3 main attributes: - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format. - OVS_PACKET_ATTR_PACKET - Binary packet content. - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet. OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure with the metadata like conntrack state, input port, recirculation id, etc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38558"
},
{
"cve": "CVE-2024-38559",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don\u0027t ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38559"
},
{
"cve": "CVE-2024-38560",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "scsi: bfa: Ensure the copied buf is NUL terminated Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from userspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t ensure that the string is terminated inside the buffer, this can lead to OOB read when using sscanf.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38560"
},
{
"cve": "CVE-2024-38565",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: ar5523: enable proper endpoint verification Syzkaller reports [1] hitting a warning about an endpoint in use not having an expected type to it. Fix the issue by checking for the existence of all proper endpoints with their according types intact. Sadly, this patch has not been tested on real hardware.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38565"
},
{
"cve": "CVE-2024-38567",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: carl9170: add a proper sanity check for endpoints Syzkaller reports [1] hitting a warning which is caused by presence of a wrong endpoint type at the URB sumbitting stage. While there was a check for a specific 4th endpoint, since it can switch types between bulk and interrupt, other endpoints are trusted implicitly. Similar warning is triggered in a couple of other syzbot issues [2].",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38567"
},
{
"cve": "CVE-2024-38578",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ecryptfs: Fix buffer size for tag 66 packet The \u0027TAG 66 Packet Format\u0027 description is missing the cipher code and checksum fields that are packed into the message packet. As a result, the buffer allocated for the packet is 3 bytes too small and write_tag_66_packet() will write up to 3 bytes past the end of the buffer. Fix this by increasing the size of the allocation so the whole packet will always fit in the buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38578"
},
{
"cve": "CVE-2024-38579",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38579"
},
{
"cve": "CVE-2024-38587",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nspeakup: Fix sizeof() vs ARRAY_SIZE() bug\r\n\r\nThe \"buf\" pointer is an array of u16 values. This code should be\r\nusing ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),\r\notherwise it can the still got out of bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38587"
},
{
"cve": "CVE-2024-38589",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netrom: fix possible dead-lock in nr_rt_ioctl() syzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1] Make sure we always acquire nr_node_list_lock before nr_node_lock(nr_node).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38589"
},
{
"cve": "CVE-2024-38596",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38596"
},
{
"cve": "CVE-2024-38598",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38599",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "jffs2: prevent xattr node from overflowing the eraseblock Add a check to make sure that the requested xattr node size is no larger than the eraseblock minus the cleanmarker. Unlike the usual inode nodes, the xattr nodes aren\u0027t split into parts and spread across multiple eraseblocks, which means that a xattr node must not occupy more than one eraseblock. If the requested xattr value is too large, the xattr node can spill onto the next eraseblock, overwriting the nodes and causing errors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38599"
},
{
"cve": "CVE-2024-38612",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn\u0027t called. This issue exist since commit 46738b1317e1 (\"ipv6: sr: add option to control lwtunnel support\"), and commit 5559cea2d5aa (\"ipv6: sr: fix possible use-after-free and null-ptr-deref\") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38612"
},
{
"cve": "CVE-2024-38615",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "cpufreq: exit() callback is optional The exit() callback is optional and shouldn\u0027t be called without checking a valid pointer first. Also, we must clear freq_table pointer even if the exit() callback isn\u0027t present.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38615"
},
{
"cve": "CVE-2024-38619",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb-storage: alauda: Check whether the media is initialized. The member \"uzonesize\" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38619"
},
{
"cve": "CVE-2024-38635",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "soundwire: cadence: invalid PDI offset.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38635"
},
{
"cve": "CVE-2024-38659",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "enic: Validate length of nl attributes in enic_set_vf_port enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE is of length PORT_PROFILE_MAX and that the nl attributes IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX. These attributes are validated (in the function do_setlink in rtnetlink.c) using the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE as NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and IFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation using the policy is for the max size of the attributes and not on exact size so the length of these attributes might be less than the sizes that enic_set_vf_port expects. This might cause an out of bands read access in the memcpys of the data of these attributes in enic_set_vf_port.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38659"
},
{
"cve": "CVE-2024-38662",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Allow delete from sockmap/sockhash only if update is allowed. We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule violation by performing a map_delete on a sockmap/sockhash. We don\u0027t intend to support this artificial use scenario. Extend the existing verifier allowed-program-type check for updating sockmap/sockhash to also cover deleting from a map. From now on only BPF programs which were previously allowed to update sockmap/sockhash can delete from these map types.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38662"
},
{
"cve": "CVE-2024-38780",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don\u0027t enable IRQ from sync_print_obj().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-38780"
},
{
"cve": "CVE-2024-39468",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "smb: client: Deadlock in smb2_find_smb_tcon().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-39468"
},
{
"cve": "CVE-2024-39482",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bcache: Variable length array abuse in btree_iter.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-39482"
},
{
"cve": "CVE-2024-39489",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix memleak in seg6_hmac_init_algo seg6_hmac_init_algo returns without cleaning up the previous allocations if one fails, so it\u0027s going to leak all that memory and the crypto tfms. Update seg6_hmac_exit to only free the memory when allocated, so we can reuse the code directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-39489"
},
{
"cve": "CVE-2024-39493",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - Fix ADF_DEV_RESET_SYNC memory leak\n\nUsing completion_done to determine whether the caller has gone\naway only works after a complete call. Furthermore it\u0027s still\npossible that the caller has not yet called wait_for_completion,\nresulting in another potential UAF.\n\nFix this by making the caller use cancel_work_sync and then freeing\nthe memory safely.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-39493"
},
{
"cve": "CVE-2024-39502",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ionic: use after netif_napi_del(). When queues are started, netif_napi_add() and napi_enable() are called. If there are 4 queues and only 3 queues are used for the current configuration, only 3 queues\u0027 napi should be registered and enabled. The ionic_qcq_enable() checks whether the .poll pointer is not NULL for enabling only the using queue\u0027 napi. Unused queues\u0027 napi will not be registered by netif_napi_add(), so the .poll pointer indicates NULL. But it couldn\u0027t distinguish whether the napi was unregistered or not because netif_napi_del() doesn\u0027t reset the .poll pointer to NULL. So, ionic_qcq_enable() calls napi_enable() for the queue, which was unregistered by netif_napi_del().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-39502"
},
{
"cve": "CVE-2024-39503",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "netfilter: ipset: race between namespace cleanup and gc in the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-39503"
},
{
"cve": "CVE-2024-39509",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "HID: core: remove unnecessary WARN_ON() in implement(). There is a warning in a call to implement() when trying to write a value into a field of smaller size in an output report. Since implement() already has a warn message printed out with the help of hid_warn() and value in question gets trimmed with: ... value \u0026= m; ... WARN_ON may be considered superfluous.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-39509"
},
{
"cve": "CVE-2024-40905",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipv6: possible race in __fib6_drop_pcpu_from().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40905"
},
{
"cve": "CVE-2024-40912",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: mac80211: deadlock in ieee80211_sta_ps_deliver_wakeup().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40912"
},
{
"cve": "CVE-2024-40916",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found When reading EDID fails and driver reports no modes available, the DRM core adds an artificial 1024x786 mode to the connector.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40916"
},
{
"cve": "CVE-2024-40934",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() Fix a memory leak on logi_dj_recv_send_report() error path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40934"
},
{
"cve": "CVE-2024-40941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "wifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation. In case the firmware sends a notification that claims it has more data than it has, it will read past that was allocated for the notification.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40941"
},
{
"cve": "CVE-2024-40942",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects The hwmp code use objects of type mesh_preq_queue, added to a list in ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath gets deleted, ex mesh interface is removed, the entries in that list will never get cleaned.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40942"
},
{
"cve": "CVE-2024-40945",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"notes": [
{
"category": "summary",
"text": "iommu: Return right value in iommu_sva_bind_device() iommu_sva_bind_device() should return either a sva bond handle or an ERR_PTR value in error cases. Existing drivers (idxd and uacce) only check the return value with IS_ERR(). This could potentially lead to a kernel NULL pointer dereference issue if the function returns NULL instead of an error pointer. In reality, this doesn\u0027t cause any problems because iommu_sva_bind_device() only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40945"
},
{
"cve": "CVE-2024-40958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40958"
},
{
"cve": "CVE-2024-40959",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40959"
},
{
"cve": "CVE-2024-40960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent possible NULL dereference in rt6_probe() syzbot caught a NULL dereference in rt6_probe() [1] Bail out if __in6_dev_get() returns NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40960"
},
{
"cve": "CVE-2024-40961",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent possible NULL deref in fib6_nh_init() syzbot reminds us that in6_dev_get() can return NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40961"
},
{
"cve": "CVE-2024-40971",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "f2fs: remove clear SB_INLINECRYPT flag in default_options In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set. If create new file or open file during this gap, these files will not use inlinecrypt. Worse case, it may lead to data corruption if wrappedkey_v0 is enable.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40971"
},
{
"cve": "CVE-2024-40978",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "scsi: qedi: crash while reading debugfs attribute. The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly on a __user pointer, which results into the crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40978"
},
{
"cve": "CVE-2024-40980",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drop_monitor: replace spin_lock by raw_spin_lock trace_drop_common() is called with preemption disabled, and it acquires a spin_lock. This is problematic for RT kernels because spin_locks are sleeping locks in this configuration, which causes the following splat.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40980"
},
{
"cve": "CVE-2024-40984",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ACPICA: Revert \"ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.\"",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40984"
},
{
"cve": "CVE-2024-40993",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: ipset: suspicious rcu_dereference_protected().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40993"
},
{
"cve": "CVE-2024-40995",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: act_api: possible infinite loop in tcf_idr_check_alloc().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40995"
},
{
"cve": "CVE-2024-41000",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "block/ioctl: prefer different overflow check Running syzkaller with the newly reintroduced signed integer overflow sanitizer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-41000"
},
{
"cve": "CVE-2024-41004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tracing: Build event generation tests only as modules The kprobes and synth event generation test modules add events and lock (get a reference) those event file reference in module init function, and unlock and delete it in module exit function. This is because those are designed for playing as modules. If we make those modules as built-in, those events are left locked in the kernel, and never be removed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-41004"
},
{
"cve": "CVE-2024-41005",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "netpoll: race condition in netpoll_owner_active KCSAN detected a race condition in netpoll.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-41005"
},
{
"cve": "CVE-2024-41006",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "netrom: a memory leak in nr_heartbeat_expiry().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-41006"
},
{
"cve": "CVE-2024-41016",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()\r\n\r\nxattr in ocfs2 maybe \u0027non-indexed\u0027, which saved with additional space requested. It\u0027s better to check if the memory is out of bound before memcmp, although this possibility mainly comes from crafted poisonous images.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-41016"
},
{
"cve": "CVE-2024-41996",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-41996"
},
{
"cve": "CVE-2024-42070",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42070"
},
{
"cve": "CVE-2024-42082",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "xdp: unused WARN() in __xdp_reg_mem_model().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42082"
},
{
"cve": "CVE-2024-42090",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "pinctrl: deadlock in create_pinctrl() when handling -EPROBE_DEFER. In create_pinctrl(), pinctrl_maps_mutex is acquired before calling add_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl() calls pinctrl_free(). However, pinctrl_free() attempts to acquire pinctrl_maps_mutex, which is already held by create_pinctrl(), leading to a potential deadlock.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42090"
},
{
"cve": "CVE-2024-42093",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/dpaa2: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42093"
},
{
"cve": "CVE-2024-42094",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/iucv: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42094"
},
{
"cve": "CVE-2024-42096",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: x86: stop playing stack games in profile_pc().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42096"
},
{
"cve": "CVE-2024-42097",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A missed validation vulnerability in the Linux Kernel\u0027s MIDI sequencer and router support functionality could allow a local user to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42097"
},
{
"cve": "CVE-2024-42114",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42114"
},
{
"cve": "CVE-2024-42259",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/i915/gem: Fix Virtual Memory mapping boundaries calculation\r\n\r\nCalculating the size of the mapped area as the lesser value\r\nbetween the requested size and the actual size does not consider\r\nthe partial mapping offset. This can cause page fault access.\r\n\r\nFix the calculation of the starting and ending addresses, the\r\ntotal size is now deduced from the difference between the end and\r\nstart addresses.\r\n\r\nAdditionally, the calculations have been rewritten in a clearer\r\nand more understandable form.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42259"
},
{
"cve": "CVE-2024-42265",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nprotect the fetch of -\u003efd[fd] in do_dup2() from mispredictions\r\n\r\nboth callers have verified that fd is not greater than -\u003emax_fds;\r\nhowever, misprediction might end up with\r\n tofree = fdt-\u003efd[fd];\r\nbeing speculatively executed. That\u0027s wrong for the same reasons\r\nwhy it\u0027s wrong in close_fd()/file_close_fd_locked(); the same\r\nsolution applies - array_index_nospec(fd, fdt-\u003emax_fds) could differ\r\nfrom fd only in case of speculative execution on mispredicted path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42265"
},
{
"cve": "CVE-2024-42272",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "sched: act_ct: take care of padding in struct zones_ht_key.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42272"
},
{
"cve": "CVE-2024-42276",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnvme-pci: add missing condition check for existence of mapped data\r\n\r\nnvme_map_data() is called when request has physical segments, hence\r\nthe nvme_unmap_data() should have same condition to avoid dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42276"
},
{
"cve": "CVE-2024-42281",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbpf: Fix a segment issue when downgrading gso_size\r\n\r\nLinearize the skb when downgrading gso_size because it may trigger a\r\nBUG_ON() later when the skb is segmented as described in [1,2].",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42281"
},
{
"cve": "CVE-2024-42283",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nexthop: Initialize all fields in dumped nexthops\n\nstruct nexthop_grp contains two reserved fields that are not initialized by\nnla_put_nh_group(), and carry garbage. This can be observed e.g. with\nstrace (edited for clarity):\n\n # ip nexthop add id 1 dev lo\n # ip nexthop add id 101 group 1\n # strace -e recvmsg ip nexthop get id 101\n ...\n recvmsg(... [{nla_len=12, nla_type=NHA_GROUP},\n [{id=1, weight=0, resvd1=0x69, resvd2=0x67}]] ...) = 52\n\nThe fields are reserved and therefore not currently used. But as they are, they\nleak kernel memory, and the fact they are not just zero complicates repurposing\nof the fields for new ends. Initialize the full structure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42283"
},
{
"cve": "CVE-2024-42292",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nkobject_uevent: Fix OOB access within zap_modalias_env()\r\n\r\nzap_modalias_env() wrongly calculates size of memory block to move, so\r\nwill cause OOB memory access issue if variable MODALIAS is not the last\r\none within its @env parameter, fixed by correcting size to memmove.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42292"
},
{
"cve": "CVE-2024-42302",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/DPC: Fix use-after-free on concurrent DPC and hot-removal\n\nKeith reports a use-after-free when a DPC event occurs concurrently to\nhot-removal of the same portion of the hierarchy:\n\nThe dpc_handler() awaits readiness of the secondary bus below the\nDownstream Port where the DPC event occurred. To do so, it polls the\nconfig space of the first child device on the secondary bus. If that\nchild device is concurrently removed, accesses to its struct pci_dev\ncause the kernel to oops.\n\nThat\u0027s because pci_bridge_wait_for_secondary_bus() neglects to hold a\nreference on the child device. Before v6.3, the function was only\ncalled on resume from system sleep or on runtime resume. Holding a\nreference wasn\u0027t necessary back then because the pciehp IRQ thread\ncould never run concurrently. (On resume from system sleep, IRQs are\nnot enabled until after the resume_noirq phase. And runtime resume is\nalways awaited before a PCI device is removed.)\n\nHowever starting with v6.3, pci_bridge_wait_for_secondary_bus() is also\ncalled on a DPC event. Commit 53b54ad074de (\"PCI/DPC: Await readiness\nof secondary bus after reset\"), which introduced that, failed to\nappreciate that pci_bridge_wait_for_secondary_bus() now needs to hold a\nreference on the child device because dpc_handler() and pciehp may\nindeed run concurrently. The commit was backported to v5.10+ stable\nkernels, so that\u0027s the oldest one affected.\n\nAdd the missing reference acquisition.\n\nAbridged stack trace:\n\n BUG: unable to handle page fault for address: 00000000091400c0\n CPU: 15 PID: 2464 Comm: irq/53-pcie-dpc 6.9.0\n RIP: pci_bus_read_config_dword+0x17/0x50\n pci_dev_wait()\n pci_bridge_wait_for_secondary_bus()\n dpc_reset_link()\n pcie_do_recovery()\n dpc_handler()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42302"
},
{
"cve": "CVE-2024-42304",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: make sure the first directory block is not a hole",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42304"
},
{
"cve": "CVE-2024-42305",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: check dot and dotdot of dx_root before making dir indexed",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42305"
},
{
"cve": "CVE-2024-42306",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nudf: Avoid using corrupted block bitmap buffer",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42306"
},
{
"cve": "CVE-2024-42312",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsysctl: always initialize i_uid/i_gid\r\n\r\nAlways initialize i_uid/i_gid inside the sysfs core so set_ownership()\r\ncan safely skip setting them.\r\n\r\nCommit 5ec27ec735ba (\"fs/proc/proc_sysctl.c: fix the default values of\r\ni_uid/i_gid on /proc/sys inodes.\") added defaults for i_uid/i_gid when\r\nset_ownership() was not implemented. It also missed adjusting\r\nnet_ctl_set_ownership() to use the same default values in case the\r\ncomputation of a better value failed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-42312"
},
{
"cve": "CVE-2024-43828",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix infinite loop when replaying fast_commit\n\nWhen doing fast_commit replay an infinite loop may occur due to an\nuninitialized extent_status struct. ext4_ext_determine_insert_hole() does\nnot detect the replay and calls ext4_es_find_extent_range(), which will\nreturn immediately without initializing the \u0027es\u0027 variable.\n\nBecause \u0027es\u0027 contains garbage, an integer overflow may happen causing an\ninfinite loop in this function, easily reproducible using fstest generic/039.\n\nThis commit fixes this issue by unconditionally initializing the structure\nin function ext4_es_find_extent_range().\n\nThanks to Zhang Yi, for figuring out the real problem!",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43828"
},
{
"cve": "CVE-2024-43830",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nleds: trigger: Unregister sysfs attributes before calling deactivate()\r\n\r\nTriggers which have trigger specific sysfs attributes typically store\r\nrelated data in trigger-data allocated by the activate() callback and\r\nfreed by the deactivate() callback.\r\n\r\nCalling device_remove_groups() after calling deactivate() leaves a window\r\nwhere the sysfs attributes show/store functions could be called after\r\ndeactivation and then operate on the just freed trigger-data.\r\n\r\nMove the device_remove_groups() call to before deactivate() to close\r\nthis race window.\r\n\r\nThis also makes the deactivation path properly do things in reverse order\r\nof the activation path which calls the activate() callback before calling\r\ndevice_add_groups().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43830"
},
{
"cve": "CVE-2024-43834",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nxdp: fix invalid wait context of page_pool_destroy()\r\n\r\nIf the driver uses a page pool, it creates a page pool with\r\npage_pool_create().\r\nThe reference count of page pool is 1 as default.\r\nA page pool will be destroyed only when a reference count reaches 0.\r\npage_pool_destroy() is used to destroy page pool, it decreases a\r\nreference count.\r\nWhen a page pool is destroyed, -\u003edisconnect() is called, which is\r\nmem_allocator_disconnect().\r\nThis function internally acquires mutex_lock().\r\n\r\nIf the driver uses XDP, it registers a memory model with\r\nxdp_rxq_info_reg_mem_model().\r\nThe xdp_rxq_info_reg_mem_model() internally increases a page pool\r\nreference count if a memory model is a page pool.\r\nNow the reference count is 2.\r\n\r\nTo destroy a page pool, the driver should call both page_pool_destroy()\r\nand xdp_unreg_mem_model().\r\nThe xdp_unreg_mem_model() internally calls page_pool_destroy().\r\nOnly page_pool_destroy() decreases a reference count.\r\n\r\nIf a driver calls page_pool_destroy() then xdp_unreg_mem_model(), we\r\nwill face an invalid wait context warning.\r\nBecause xdp_unreg_mem_model() calls page_pool_destroy() with\r\nrcu_read_lock().\r\nThe page_pool_destroy() internally acquires mutex_lock().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43834"
},
{
"cve": "CVE-2024-43856",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma: fix call order in dmam_free_coherent\n\ndmam_free_coherent() frees a DMA allocation, which makes the\nfreed vaddr available for reuse, then calls devres_destroy()\nto remove and free the data structure used to track the DMA\nallocation. Between the two calls, it is possible for a\nconcurrent task to make an allocation with the same vaddr\nand add it to the devres list.\n\nIf this happens, there will be two entries in the devres list\nwith the same vaddr and devres_destroy() can free the wrong\nentry, triggering the WARN_ON() in dmam_match.\n\nFix by destroying the devres entry before freeing the DMA\nallocation.\n\n kokonut //net/encryption\n http://sponge2/b9145fe6-0f72-4325-ac2f-a84d81075b03",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43856"
},
{
"cve": "CVE-2024-43858",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: Fix array-index-out-of-bounds in diFree",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43858"
},
{
"cve": "CVE-2024-43871",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43871"
},
{
"cve": "CVE-2024-43879",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: cfg80211: Currently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in cfg80211_calculate_bitrate_he(), leading to warning.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43879"
},
{
"cve": "CVE-2024-43882",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "exec: the execution may gain unintended privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43882"
},
{
"cve": "CVE-2024-43889",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "padata: vulnerability due to a possible divide-by-zero error in padata_mt_helper() during bootup, caused by an uninitialized chunk_size being zero.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43889"
},
{
"cve": "CVE-2024-43890",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tracing: vulnerability due to an overflow in get_free_elt(), which could lead to infinite loops and CPU hangs when the tracing map becomes full.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43890"
},
{
"cve": "CVE-2024-43893",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "serial: core: vulnerability due to a missing check for uartclk being zero, leading to a potential divide-by-zero error when calling ioctl TIOCSSERIAL with an invalid baud_base.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-43893"
},
{
"cve": "CVE-2024-44935",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "sctp: Fix null-ptr-deref in reuseport_add_sock(). A Null Pointer Dereference in reuseport_add_sock() while accessing sk2-\u003esk_reuseport_cb . The repro first creates a listener with SO_REUSEPORT. Then, it creates another listener on the same port and concurrently closes the first listener. The second listen() calls reuseport_add_sock() with the first listener as sk2, where sk2-\u003esk_reuseport_cb is not expected to be cleared concurrently, but the close() does clear it by reuseport_detach_sock().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-44935"
},
{
"cve": "CVE-2024-44944",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-44944"
},
{
"cve": "CVE-2024-44948",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/mtrr: Check if fixed MTRRs exist before saving them\r\n\r\nMTRRs have an obsolete fixed variant for fine grained caching control\r\nof the 640K-1MB region that uses separate MSRs. This fixed variant has\r\na separate capability bit in the MTRR capability MSR.\r\n\r\nSo far all x86 CPUs which support MTRR have this separate bit set, so it\r\nwent unnoticed that mtrr_save_state() does not check the capability bit\r\nbefore accessing the fixed MTRR MSRs.\r\n\r\nThough on a CPU that does not support the fixed MTRR capability this\r\nresults in a #GP. The #GP itself is harmless because the RDMSR fault is\r\nhandled gracefully, but results in a WARN_ON().\r\n\r\nAdd the missing capability check to prevent this.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-44948"
},
{
"cve": "CVE-2024-44960",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: gadget: core: Check for unset descriptor. It needs to be reassured that the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn\u0027t properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the descriptor for the speed/endpoint are not found. No current gadget driver is known to have this problem, but this may cause a hard-to-find bug during development of new gadgets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-44960"
},
{
"cve": "CVE-2024-44987",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-44987"
},
{
"cve": "CVE-2024-44989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-44989"
},
{
"cve": "CVE-2024-44990",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok We must check if there is an active slave before dereferencing the pointer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-44990"
},
{
"cve": "CVE-2024-45016",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-45016"
},
{
"cve": "CVE-2024-45018",
"cwe": {
"id": "CWE-456",
"name": "Missing Initialization of a Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: initialise extack before use Fix missing initialisation of extack in flow offload.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-45018"
},
{
"cve": "CVE-2024-46679",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46679"
},
{
"cve": "CVE-2024-46743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46743"
},
{
"cve": "CVE-2024-46744",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: Squashfs: sanity check symbolic link size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46744"
},
{
"cve": "CVE-2024-46745",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which causes memory allocation failure in input_mt_init_slots(). While this allocation failure is handled properly and request is rejected, it results in syzkaller reports. Additionally, such request may put undue burden on the system which will try to free a lot of memory for a bogus request. Fix it by limiting allowed number of slots to 100. This can easily be extended if we see devices that can track more than 100 contacts.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46745"
},
{
"cve": "CVE-2024-46750",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46750"
},
{
"cve": "CVE-2024-46759",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: hwmon: (adc128d818) Fix underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user. Fix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46759"
},
{
"cve": "CVE-2024-46783",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: fix return value of tcp_bpf_sendmsg().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46783"
},
{
"cve": "CVE-2024-46854",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: dpaa: Pad packets to ETH_ZLEN\r\n\r\nWhen sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running\r\n\r\n\t$ ping -s 11 destination",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46854"
},
{
"cve": "CVE-2024-46865",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfou: fix initialization of grc\r\nThe grc must be initialize first. There can be a condition where if fou is NULL, goto out will be executed and grc would be used uninitialized.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46865"
},
{
"cve": "CVE-2024-47660",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: fsnotify: clear PARENT_WATCHED flags lazily In some setups directories can have many (usually negative) dentries. Hence __fsnotify_update_child_dentry_flags() function can take a significant amount of time. Since the bulk of this function happens under inode-\u003ei_lock this causes a significant contention on the lock when we remove the watch from the directory as the __fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask() races with __fsnotify_update_child_dentry_flags() calls from __fsnotify_parent() happening on children. This can lead upto softlockup reports reported by users. Fix the problem by calling fsnotify_update_children_dentry_flags() to set PARENT_WATCHED flags only when parent starts watching children. When parent stops watching children, clear false positive PARENT_WATCHED flags lazily in __fsnotify_parent() for each accessed child.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47660"
},
{
"cve": "CVE-2024-47672",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: iwlwifi: mvm: don\u0027t wait for tx queues if firmware is dead\r\n\r\nThere is a WARNING in iwl_trans_wait_tx_queues_empty() (that was recently converted from just a message), that can be hit if we wait for TX queues to become empty after firmware died. Clearly, we can\u0027t expect anything from the firmware after it\u0027s declared dead.\r\n\r\nDon\u0027t call iwl_trans_wait_tx_queues_empty() in this case. While it could be a good idea to stop the flow earlier, the flush functions do some maintenance work that is not related to the firmware, so keep that part of the code running even when the firmware is not running.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47672"
},
{
"cve": "CVE-2024-47684",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: check skb is non-NULL in tcp_rto_delta_us()\r\n\r\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\r\nkernel that are running ceph and recently hit a null ptr dereference in\r\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\r\nsaw it getting hit from the RACK case as well. Here are examples of the oops\r\nmessages we saw in each of those cases:\r\n\r\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\r\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\r\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\r\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\r\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\r\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\r\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\r\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\r\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\r\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\r\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\r\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\r\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\r\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\r\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\r\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\r\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\r\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\r\nJul 26 15:05:02 rx [11061395.919488]\r\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\r\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\r\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\r\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\r\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\r\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\r\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\r\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\r\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\r\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\r\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\r\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\r\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\r\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\r\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\r\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\r\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\r\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\r\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\r\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\r\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47684"
},
{
"cve": "CVE-2024-47685",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()\r\n\r\nsyzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th-\u003eres1)\r\n\r\nUse skb_put_zero() to clear the whole TCP header, as done in nf_reject_ip_tcphdr_put()\r\n\r\nBUG: KMSAN: uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core net/core/dev.c:5661 [inline]\r\n __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5775\r\n process_backlog+0x4ad/0xa50 net/core/dev.c:6108\r\n __napi_poll+0xe7/0x980 net/core/dev.c:6772\r\n napi_poll net/core/dev.c:6841 [inline]\r\n net_rx_action+0xa5a/0x19b0 net/core/dev.c:6963\r\n handle_softirqs+0x1ce/0x800 kernel/softirq.c:554\r\n __do_softirq+0x14/0x1a kernel/softirq.c:588\r\n do_softirq+0x9a/0x100 kernel/softirq.c:455\r\n __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:382\r\n local_bh_enable include/linux/bottom_half.h:33 [inline]\r\n rcu_read_unlock_bh include/linux/rcupdate.h:908 [inline]\r\n __dev_queue_xmit+0x2692/0x5610 net/core/dev.c:4450\r\n dev_queue_xmit include/linux/netdevice.h:3105 [inline]\r\n neigh_resolve_output+0x9ca/0xae0 net/core/neighbour.c:1565\r\n neigh_output include/net/neighbour.h:542 [inline]\r\n ip6_finish_output2+0x2347/0x2ba0 net/ipv6/ip6_output.c:141\r\n __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]\r\n ip6_finish_output+0xbb8/0x14b0 net/ipv6/ip6_output.c:226\r\n NF_HOOK_COND include/linux/netfilter.h:303 [inline]\r\n ip6_output+0x356/0x620 net/ipv6/ip6_output.c:247\r\n dst_output include/net/dst.h:450 [inline]\r\n NF_HOOK include/linux/netfilter.h:314 [inline]\r\n ip6_xmit+0x1ba6/0x25d0 net/ipv6/ip6_output.c:366\r\n inet6_csk_xmit+0x442/0x530 net/ipv6/inet6_connection_sock.c:135\r\n __tcp_transmit_skb+0x3b07/0x4880 net/ipv4/tcp_output.c:1466\r\n tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]\r\n tcp_connect+0x35b6/0x7130 net/ipv4/tcp_output.c:4143\r\n tcp_v6_connect+0x1bcc/0x1e40 net/ipv6/tcp_ipv6.c:333\r\n __inet_stream_connect+0x2ef/0x1730 net/ipv4/af_inet.c:679\r\n inet_stream_connect+0x6a/0xd0 net/ipv4/af_inet.c:750\r\n __sys_connect_file net/socket.c:2061 [inline]\r\n __sys_connect+0x606/0x690 net/socket.c:2078\r\n __do_sys_connect net/socket.c:2088 [inline]\r\n __se_sys_connect net/socket.c:2085 [inline]\r\n __x64_sys_connect+0x91/0xe0 net/socket.c:2085\r\n x64_sys_call+0x27a5/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:43\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was stored to memory at:\r\n nf_reject_ip6_tcphdr_put+0x60c/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:249\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47685"
},
{
"cve": "CVE-2024-47692",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfsd: return -EINVAL when namelen is 0\r\nWhen we have a corrupted main.sqlite in /var/lib/nfs/nfsdcld/, it may result in namelen being 0, which will cause memdup_user() to return ZERO_SIZE_PTR.\r\nWhen we access the name.data that has been assigned the value of ZERO_SIZE_PTR in nfs4_client_to_reclaim(), null pointer dereference is triggered.\r\n\r\n[ T1205] ==================================================================\r\n[ T1205] BUG: KASAN: null-ptr-deref in nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] Read of size 1 at addr 0000000000000010 by task nfsdcld/1205\r\n[ T1205]\r\n[ T1205] CPU: 11 PID: 1205 Comm: nfsdcld Not tainted 5.10.0-00003-g2c1423731b8d #406\r\n[ T1205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014\r\n[ T1205] Call Trace:\r\n[ T1205] dump_stack+0x9a/0xd0\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] __kasan_report.cold+0x34/0x84\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] kasan_report+0x3a/0x50\r\n[ T1205] nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] ? nfsd4_release_lockowner+0x410/0x410\r\n[ T1205] cld_pipe_downcall+0x5ca/0x760\r\n[ T1205] ? nfsd4_cld_tracking_exit+0x1d0/0x1d0\r\n[ T1205] ? down_write_killable_nested+0x170/0x170\r\n[ T1205] ? avc_policy_seqno+0x28/0x40\r\n[ T1205] ? selinux_file_permission+0x1b4/0x1e0\r\n[ T1205] rpc_pipe_write+0x84/0xb0\r\n[ T1205] vfs_write+0x143/0x520\r\n[ T1205] ksys_write+0xc9/0x170\r\n[ T1205] ? __ia32_sys_read+0x50/0x50\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xfe/0x110\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xa2/0x110\r\n[ T1205] do_syscall_64+0x33/0x40\r\n[ T1205] entry_SYSCALL_64_after_hwframe+0x67/0xd1\r\n[ T1205] RIP: 0033:0x7fdbdb761bc7\r\n[ T1205] Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 514\r\n[ T1205] RSP: 002b:00007fff8c4b7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\r\n[ T1205] RAX: ffffffffffffffda RBX: 000000000000042b RCX: 00007fdbdb761bc7\r\n[ T1205] RDX: 000000000000042b RSI: 00007fff8c4b75f0 RDI: 0000000000000008\r\n[ T1205] RBP: 00007fdbdb761bb0 R08: 0000000000000000 R09: 0000000000000001\r\n[ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000042b\r\n[ T1205] R13: 0000000000000008 R14: 00007fff8c4b75f0 R15: 0000000000000000\r\n[ T1205] ==================================================================",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47692"
},
{
"cve": "CVE-2024-47696",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency\r\n\r\nIn the commit aee2424246f9 (\"RDMA/iwcm: Fix a use-after-free related to destroying CM IDs\"), the function flush_workqueue is invoked to flush the work queue iwcm_wq.\r\n\r\nBut at that time, the work queue iwcm_wq was created via the function alloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.\r\n\r\nBecause the current process is trying to flush the whole iwcm_wq, if iwcm_wq doesn\u0027t have the flag WQ_MEM_RECLAIM, verify that the current process is not reclaiming memory or running on a workqueue which doesn\u0027t have the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee leading to a deadlock.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47696"
},
{
"cve": "CVE-2024-47697",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error\r\n\r\nEnsure index in rtl2830_pid_filter does not exceed 31 to prevent out-of-bounds access.\r\n\r\ndev-\u003efilters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access.\r\nChange the boundary check from index \u003e 32 to index \u003e= 32 to resolve this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47697"
},
{
"cve": "CVE-2024-47699",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix potential null-ptr-deref in nilfs_btree_insert()\r\n\r\nPatch series \"nilfs2: fix potential issues with empty b-tree nodes\".\r\n\r\nThis series addresses three potential issues with empty b-tree nodes that can occur with corrupted filesystem images, including one recently discovered by syzbot.\r\n\r\n\r\nThis patch (of 3):\r\n\r\nIf a b-tree is broken on the device, and the b-tree height is greater than 2 (the level of the root node is greater than 1) even if the number of child nodes of the b-tree root is 0, a NULL pointer dereference occurs in nilfs_btree_prepare_insert(), which is called from nilfs_btree_insert().\r\n\r\nThis is because, when the number of child nodes of the b-tree root is 0, nilfs_btree_do_lookup() does not set the block buffer head in any of path[x].bp_bh, leaving it as the initial value of NULL, but if the level of the b-tree root node is greater than 1, nilfs_btree_get_nonroot_node(), which accesses the buffer memory of path[x].bp_bh, is called.\r\n\r\nFix this issue by adding a check to nilfs_btree_root_broken(), which performs sanity checks when reading the root node from the device, to detect this inconsistency.\r\n\r\nThanks to Lizhi Xu for trying to solve the bug and clarifying the cause early on.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47699"
},
{
"cve": "CVE-2024-47701",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid OOB when system.data xattr changes underneath the filesystem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47701"
},
{
"cve": "CVE-2024-47705",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock: fix potential invalid pointer dereference in blk_add_partition\r\n\r\nThe blk_add_partition() function initially used a single if-condition (IS_ERR(part)) to check for errors when adding a partition. This was modified to handle the specific case of -ENXIO separately, allowing the function to proceed without logging the error in this case. However, this change unintentionally left a path where md_autodetect_dev() could be called without confirming that part is a valid pointer.\r\n\r\nThis commit separates the error handling logic by splitting the initial if-condition, improving code readability and handling specific error scenarios explicitly. The function now distinguishes the general error case from -ENXIO without altering the existing behavior of md_autodetect_dev() calls.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47705"
},
{
"cve": "CVE-2024-47706",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock, bfq: fix possible UAF for bfqq-\u003ebic with merge chain\r\n\r\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\r\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\r\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\r\nstate, and set bfqq2-\u003ebic to BIC1.\r\n\r\nAllocated by task 20776:\r\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\r\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\r\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\r\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\r\n slab_post_alloc_hook mm/slab.h:763 [inline]\r\n slab_alloc_node mm/slub.c:3458 [inline]\r\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\r\n ioc_create_icq block/blk-ioc.c:370 [inline]\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47706"
},
{
"cve": "CVE-2024-47707",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: A NULL dereference vulnerability may occur in rt6_uncached_list_flush_dev() due to the necessary check being removed by a previous commit.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47707"
},
{
"cve": "CVE-2024-47709",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "can: bcm: A warning is triggered when connect() is issued again for a socket whose connect()ed device has been unregistered. However, if the socket is just close()d without the 2nd connect(), the remaining bo-\u003ebcm_proc_read triggers unnecessary remove_proc_entry() in bcm_release().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47709"
},
{
"cve": "CVE-2024-47710",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "sock_map: vulnerability result of adding a cond_resched() in sock_hash_free() to prevent CPU soft lockups when destroying maps with a large number of buckets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47710"
},
{
"cve": "CVE-2024-47713",
"cwe": {
"id": "CWE-664",
"name": "Improper Control of a Resource Through its Lifetime"
},
"notes": [
{
"category": "summary",
"text": "wifi: mac80211: vulnerability caused by implementing a two-phase skb reclamation in ieee80211_do_stop() to avoid warnings and potential issues caused by calling __dev_queue_xmit() with interrupts disabled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47713"
},
{
"cve": "CVE-2024-47718",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "wifi: rtw88: vulnerability may lead to a use-after-free (UAF) error if firmware loading is not properly synchronized during USB initialization and disconnection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47718"
},
{
"cve": "CVE-2024-47723",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix out-of-bounds in dbNextAG() and diAlloc()\r\n\r\nIn dbNextAG() , there is no check for the case where bmp-\u003edb_numag is greater or same than MAXAG due to a polluted image, which causes an out-of-bounds. Therefore, a bounds check should be added in dbMount().\r\n\r\nAnd in dbNextAG(), a check for the case where agpref is greater than bmp-\u003edb_numag should be added, so an out-of-bounds exception should be prevented.\r\n\r\nAdditionally, a check for the case where agno is greater or same than MAXAG should be added in diAlloc() to prevent out-of-bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47723"
},
{
"cve": "CVE-2024-47735",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "RDMA/hns: missuse of spin_lock_irq()/spin_unlock_irq() when spin_lock_irqsave()/spin_lock_irqrestore() was hold.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47735"
},
{
"cve": "CVE-2024-47737",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47737"
},
{
"cve": "CVE-2024-47747",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition. In the ether3_probe function, a timer is initialized with a callback function ether3_ledoff, bound to \u0026prev(dev)-\u003etimer. Once the timer is started, there is a risk of a race condition if the module or device is removed, triggering the ether3_remove function to perform cleanup.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47747"
},
{
"cve": "CVE-2024-49851",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "tpm: Clean up TPM space after command failure tpm_dev_transmit prepares the TPM space before attempting command transmission. However if the command fails no rollback of this preparation is done. This can result in transient handles being leaked if the device is subsequently closed with no further commands performed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49851"
},
{
"cve": "CVE-2024-49889",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid use-after-free in ext4_ext_show_leaf()\r\n\r\nIn ext4_find_extent(), path may be freed by error or be reallocated, so\r\nusing a previously saved *ppath may have been freed and thus may trigger\r\nuse-after-free, as follows:\r\n\r\next4_split_extent\r\n path = *ppath;\r\n ext4_split_extent_at(ppath)\r\n path = ext4_find_extent(ppath)\r\n ext4_split_extent_at(ppath)\r\n // ext4_find_extent fails to free path\r\n // but zeroout succeeds\r\n ext4_ext_show_leaf(inode, path)\r\n eh = path[depth].p_hdr\r\n // path use-after-free !!!\r\n\r\nSimilar to ext4_split_extent_at(), we use *ppath directly as an input to\r\next4_ext_show_leaf(). Fix a spelling error by the way.\r\n\r\nSame problem in ext4_ext_handle_unwritten_extents(). Since \u0027path\u0027 is only\r\nused in ext4_ext_show_leaf(), remove \u0027path\u0027 and use *ppath directly.\r\n\r\nThis issue is triggered only when EXT_DEBUG is defined and therefore does\r\nnot affect functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49889"
},
{
"cve": "CVE-2024-49890",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/pm: ensure the fw_info is not null before using it\r\n\r\nThis resolves the dereference null return value warning reported by Coverity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49890"
},
{
"cve": "CVE-2024-49892",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Initialize get_bytes_per_element\u0027s default to 1\r\n\r\nVariables, used as denominators and maybe not assigned to other values, should not be 0. bytes_per_element_y \u0026 bytes_per_element_c are initialized by get_bytes_per_element() which should never return 0.\r\n\r\nThis fixes 10 DIVIDE_BY_ZERO issues reported by Coverity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49892"
},
{
"cve": "CVE-2024-49894",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Fix index out of bounds in degamma hardware format translation\r\n\r\nFixes index out of bounds issue in\r\n`cm_helper_translate_curve_to_degamma_hw_format` function. The issue\r\ncould occur when the index \u0027i\u0027 exceeds the number of transfer function\r\npoints (TRANSFER_FUNC_POINTS).\r\n\r\nThe fix adds a check to ensure \u0027i\u0027 is within bounds before accessing the\r\ntransfer function points. If \u0027i\u0027 is out of bounds the function returns\r\nfalse to indicate an error.\r\n\r\nReported by smatch:\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.red\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.green\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.blue\u0027 1025 \u003c= s32max",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49894"
},
{
"cve": "CVE-2024-49900",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uninit-value access of new_ea in ea_buffer\r\n\r\nsyzbot reports that lzo1x_1_do_compress is using uninit-value:\r\n\r\n=====================================================\r\nBUG: KMSAN: uninit-value in lzo1x_1_do_compress+0x19f9/0x2510 lib/lzo/lzo1x_compress.c:178\r\n\r\n...\r\n\r\nUninit was stored to memory at:\r\n ea_put fs/jfs/xattr.c:639 [inline]\r\n\r\n...\r\n\r\nLocal variable ea_buf created at:\r\n __jfs_setxattr+0x5d/0x1ae0 fs/jfs/xattr.c:662\r\n __jfs_xattr_set+0xe6/0x1f0 fs/jfs/xattr.c:934\r\n\r\n=====================================================\r\n\r\nThe reason is ea_buf-\u003enew_ea is not initialized properly.\r\n\r\nFix this by using memset to empty its content at the beginning\r\nin ea_get().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49900"
},
{
"cve": "CVE-2024-49902",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "jfs: vulnerability caused by assigning msm_gpu-\u003epdev earlier in the initialization process to prevent null pointer dereferences in msm_gpu_cleanup.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49902"
},
{
"cve": "CVE-2024-49903",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uaf in dbFreeBits\r\n\r\n[syzbot reported]\r\n==================================================================\r\nBUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\nBUG: KASAN: slab-use-after-free in __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\nRead of size 8 at addr ffff8880229254b0 by task syz-executor357/5216\r\n\r\nCPU: 0 UID: 0 PID: 5216 Comm: syz-executor357 Not tainted 6.11.0-rc3-syzkaller-00156-gd7a5aa4b3c00 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024\r\nCall Trace:\r\n \u003cTASK\u003e\r\n __dump_stack lib/dump_stack.c:93 [inline]\r\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\r\n print_address_description mm/kasan/report.c:377 [inline]\r\n print_report+0x169/0x550 mm/kasan/report.c:488\r\n kasan_report+0x143/0x180 mm/kasan/report.c:601\r\n __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\n __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\n dbFreeBits+0x7ea/0xd90 fs/jfs/jfs_dmap.c:2390\r\n dbFreeDmap fs/jfs/jfs_dmap.c:2089 [inline]\r\n dbFree+0x35b/0x680 fs/jfs/jfs_dmap.c:409\r\n dbDiscardAG+0x8a9/0xa20 fs/jfs/jfs_dmap.c:1650\r\n jfs_ioc_trim+0x433/0x670 fs/jfs/jfs_discard.c:100\r\n jfs_ioctl+0x2d0/0x3e0 fs/jfs/ioctl.c:131\r\n vfs_ioctl fs/ioctl.c:51 [inline]\r\n __do_sys_ioctl fs/ioctl.c:907 [inline]\r\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n\r\nFreed by task 5218:\r\n kasan_save_stack mm/kasan/common.c:47 [inline]\r\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\r\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579\r\n poison_slab_object+0xe0/0x150 mm/kasan/common.c:240\r\n __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256\r\n kasan_slab_free include/linux/kasan.h:184 [inline]\r\n slab_free_hook mm/slub.c:2252 [inline]\r\n slab_free mm/slub.c:4473 [inline]\r\n kfree+0x149/0x360 mm/slub.c:4594\r\n dbUnmount+0x11d/0x190 fs/jfs/jfs_dmap.c:278\r\n jfs_mount_rw+0x4ac/0x6a0 fs/jfs/jfs_mount.c:247\r\n jfs_remount+0x3d1/0x6b0 fs/jfs/super.c:454\r\n reconfigure_super+0x445/0x880 fs/super.c:1083\r\n vfs_cmd_reconfigure fs/fsopen.c:263 [inline]\r\n vfs_fsconfig_locked fs/fsopen.c:292 [inline]\r\n __do_sys_fsconfig fs/fsopen.c:473 [inline]\r\n __se_sys_fsconfig+0xb6e/0xf80 fs/fsopen.c:345\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\n[Analysis]\r\nThere are two paths (dbUnmount and jfs_ioc_trim) that generate race condition when accessing bmap, which leads to the occurrence of uaf.\r\n\r\nUse the lock s_umount to synchronize them, in order to avoid uaf caused by race condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49903"
},
{
"cve": "CVE-2024-49930",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "wifi: ath11k: fix array out-of-bound access in SoC stats. Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx() function access ath11k_soc_dp_stats::hal_reo_error using the REO destination SRNG ring ID, which is incorrect. SRNG ring ID differ from normal ring ID, and this usage leads to out-of-bounds array access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49930"
},
{
"cve": "CVE-2024-49938",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit\r\n\r\nSyzbot points out that skb_trim() has a sanity check on the existing length of the skb, which can be uninitialised in some error paths. The intent here is clearly just to reset the length to zero before resubmitting, so switch to calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length() already contains a call to skb_reset_tail_pointer(), so remove the redundant call.\r\n\r\nThe syzbot report came from ath9k_hif_usb_reg_in_cb(), but there\u0027s a similar usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we\u0027re at it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49938"
},
{
"cve": "CVE-2024-49944",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start. In sctp_listen_start() invoked by sctp_inet_listen(), it should set the sk_state back to CLOSED if sctp_autobind() fails due to whatever reason. Otherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)-\u003ereuse is already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)-\u003ebind_hash will be dereferenced as sk_state is LISTENING, which causes a crash as bind_hash is NULL",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49944"
},
{
"cve": "CVE-2024-49948",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49948"
},
{
"cve": "CVE-2024-49949",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: avoid potential underflow in qdisc_pkt_len_init() with UFO.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49949"
},
{
"cve": "CVE-2024-49952",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prevent nf_skb_duplicated corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49952"
},
{
"cve": "CVE-2024-49955",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nACPI: battery: Fix possible crash when unregistering a battery hook\r\n\r\nWhen a battery hook returns an error when adding a new battery, then the battery hook is automatically unregistered.\r\nHowever the battery hook provider cannot know that, so it will later call battery_hook_unregister() on the already unregistered battery hook, resulting in a crash.\r\n\r\nFix this by using the list head to mark already unregistered battery hooks as already being unregistered so that they can be ignored by battery_hook_unregister().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49955"
},
{
"cve": "CVE-2024-49973",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "r8169: RTL8125 added fields to the tally counter, this change could cause the chip to perform Direct Memory Access on these new fields, potentially writing to unallocated memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49973"
},
{
"cve": "CVE-2024-49977",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: stmmac: port_transmit_rate_kbps could be set to a value of 0, which is then passed to the \"div_s64\" function when tc-cbs is disabled. This leads to a zero-division error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49977"
},
{
"cve": "CVE-2024-49997",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix memory disclosure When applying padding, the buffer is not zeroed, which results in memory disclosure. The mentioned data is observed on the wire. This patch uses skb_put_padto() to pad Ethernet frames properly. The mentioned function zeroes the expanded buffer. In case the packet cannot be padded it is silently dropped. Statistics are also not incremented. This driver does not support statistics in the old 32-bit format or the new 64-bit format. These will be added in the future. In its current form, the patch should be easily backported to stable versions. Ethernet MACs on Amazon-SE and Danube cannot do padding of the packets in hardware, so software padding must be applied.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-49997"
},
{
"cve": "CVE-2024-50001",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/mlx5: Fix error path in multi-packet WQE transmit\r\n\r\nRemove the erroneous unmap in case no DMA mapping was established\r\n\r\nThe multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. This could fail, e.g. under memory pressure, when the IOMMU driver just can\u0027t allocate more memory for page tables. While the code tries to handle this in the path below the err_unmap label it erroneously unmaps one entry from the sq\u0027s FIFO list of active mappings. Since the current map attempt failed this unmap is removing some random DMA mapping that might still be required. If the PCI function now presents that IOVA, the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI function in error state.\r\n\r\nThe erroneous behavior was seen in a stress-test environment that created memory pressure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50001"
},
{
"cve": "CVE-2024-50006",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50006"
},
{
"cve": "CVE-2024-50008",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "wifi: mwifiex: memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() Replace one-element array with a flexible-array member in `struct host_cmd_ds_802_11_scan_ext`.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50008"
},
{
"cve": "CVE-2024-50010",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nexec: don\u0027t WARN for racy path_noexec check\r\n\r\nBoth i_mode and noexec checks wrapped in WARN_ON stem from an artifact\r\nof the previous implementation. They used to legitimately check for the\r\ncondition, but that got moved up in two commits:\r\n633fb6ac3980 (\"exec: move S_ISREG() check earlier\")\r\n0fd338b2d2cd (\"exec: move path_noexec() check earlier\")\r\n\r\nInstead of being removed said checks are WARN_ON\u0027ed instead, which has some debug value.\r\n\r\nHowever, the spurious path_noexec check is racy, resulting in unwarranted warnings should someone race with setting the noexec flag.\r\n\r\nOne can note there is more to perm-checking whether execve is allowed and none of the conditions are guaranteed to still hold after they were tested for.\r\n\r\nAdditionally this does not validate whether the code path did any perm checking to begin with -- it will pass if the inode happens to be regular.\r\n\r\nKeep the redundant path_noexec() check even though it\u0027s mindless nonsense checking for guarantee that isn\u0027t given so drop the WARN.\r\n\r\nReword the commentary and do small tidy ups while here.\r\n\r\n[brauner: keep redundant path_noexec() check]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50010"
},
{
"cve": "CVE-2024-50015",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "ext4: dax: Overflowing extents beyond inode size when partially writing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50015"
},
{
"cve": "CVE-2024-50033",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nslip: make slhc_remember() more robust against malicious packets\r\n\r\nsyzbot found that slhc_remember() was missing checks against\r\nmalicious packets [1].\r\n\r\nslhc_remember() only checked the size of the packet was at least 20,\r\nwhich is not good enough.\r\n\r\nWe need to make sure the packet includes the IPv4 and TCP header\r\nthat are supposed to be carried.\r\n\r\nAdd iph and th pointers to make the code more readable.\r\n\r\n[1]\r\n\r\nBUG: KMSAN: uninit-value in slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n ppp_receive_nonmp_frame+0xe45/0x35e0 drivers/net/ppp/ppp_generic.c:2455\r\n ppp_receive_frame drivers/net/ppp/ppp_generic.c:2372 [inline]\r\n ppp_do_recv+0x65f/0x40d0 drivers/net/ppp/ppp_generic.c:2212\r\n ppp_input+0x7dc/0xe60 drivers/net/ppp/ppp_generic.c:2327\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4091 [inline]\r\n slab_alloc_node mm/slub.c:4134 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4186\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 0 UID: 0 PID: 5460 Comm: syz.2.33 Not tainted 6.12.0-rc2-syzkaller-00006-g87d6aab2389e #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50033"
},
{
"cve": "CVE-2024-50035",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp: fix ppp_async_encode() illegal access\r\n\r\nsyzbot reported an issue in ppp_async_encode() [1]\r\n\r\nIn this case, pppoe_sendmsg() is called with a zero size.\r\nThen ppp_async_encode() is called with an empty skb.\r\n\r\nBUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634\r\n ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]\r\n ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4092 [inline]\r\n slab_alloc_node mm/slub.c:4135 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50035"
},
{
"cve": "CVE-2024-50039",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/sched: accept TCA_STAB only for root qdisc\r\n\r\nMost qdiscs maintain their backlog using qdisc_pkt_len(skb) on the assumption it is invariant between the enqueue() and dequeue() handlers.\r\n\r\nUnfortunately syzbot can crash a host rather easily using a TBF + SFQ combination, with an STAB on SFQ [1]\r\n\r\nWe can\u0027t support TCA_STAB on arbitrary level, this would require to maintain per-qdisc storage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50039"
},
{
"cve": "CVE-2024-50040",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: igb: Do not bring the device up after non-fatal error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50040"
},
{
"cve": "CVE-2024-50044",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change\r\n\r\nrfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50044"
},
{
"cve": "CVE-2024-50045",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: fix panic with metadata_dst skb.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50045"
},
{
"cve": "CVE-2024-50046",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nNFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()\r\n\r\nOn the node of an NFS client, some files saved in the mountpoint of the NFS server were copied to another location of the same NFS server.\r\nAccidentally, the nfs42_complete_copies() got a NULL-pointer dereference crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50046"
},
{
"cve": "CVE-2024-50058",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nserial: protect uart_port_dtr_rts() in uart_shutdown() too\r\n\r\nCommit af224ca2df29 (serial: core: Prevent unsafe uart port access, part 3) added few uport == NULL checks. It added one to uart_shutdown(), so the commit assumes, uport can be NULL in there. But right after that protection, there is an unprotected \"uart_port_dtr_rts(uport, false);\" call. That is invoked only if HUPCL is set, so I assume that is the reason why we do not see lots of these reports.\r\n\r\nOr it cannot be NULL at this point at all for some reason :P.\r\n\r\nUntil the above is investigated, stay on the safe side and move this dereference to the if too.\r\n\r\nI got this inconsistency from Coverity under CID 1585130. Thanks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50058"
},
{
"cve": "CVE-2024-50095",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/mad: Improve handling of timed out WRs of mad agent\r\n\r\nCurrent timeout handler of mad agent acquires/releases mad_agent_priv lock for every timed out WRs. This causes heavy locking contention when higher no. of WRs are to be handled inside timeout handler.\r\n\r\nThis leads to softlockup with below trace in some use cases where rdma-cm path is used to establish connection between peer nodes\r\n\r\n\r\nSimplified timeout handler by creating local list of timed out WRs and invoke send handler post creating the list. The new method acquires/releases lock once to fetch the list and hence helps to reduce locking contetiong when processing higher no. of WRs",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50095"
},
{
"cve": "CVE-2024-50121",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "nfsd: problematic nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net. In the normal case, when we excute `echo 0 \u003e /proc/fs/nfsd/threads`, the function `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will release all resources related to the hashed `nfs4_client`.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50121"
},
{
"cve": "CVE-2024-50127",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: sched: fix use-after-free in taprio_change()\r\n\r\nIn \u0027taprio_change()\u0027, \u0027admin\u0027 pointer may become dangling due to sched switch / removal caused by \u0027advance_sched()\u0027, and critical section protected by \u0027q-current_entry_lock\u0027 is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer \u0027rcu_replace_pointer()\u0027 ver \u0027rcu_assign_pointer()\u0027 to update \u0027admin\u0027 immediately before an attempt to schedule freeing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50127"
},
{
"cve": "CVE-2024-50131",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntracing: Consider the NULL character when validating the event length\r\n\r\nstrlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer length, the buffer will have no space for the NULL terminating character.\r\n\r\nThis commit checks this condition and returns failure for it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50131"
},
{
"cve": "CVE-2024-50134",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA\r\n\r\nReplace the fake VLA at end of the vbva_mouse_pointer_shape shape with a real VLA to fix a \"memcpy: detected field-spanning write error\".\r\n\r\nNote as mentioned in the added comment it seems the original length calculation for the allocated and send hgsmi buffer is 4 bytes too large.\r\nChanging this is not the goal of this patch, so this behavior is kept.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50134"
},
{
"cve": "CVE-2024-50142",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nxfrm: validate new SA\u0027s prefixlen using SA family when sel.family is unset\r\n\r\nThis expands the validation introduced in commit 07bf7908950a (\"xfrm:Validate address prefix lengths in the xfrm selector.\")\r\n\r\nsyzbot created an SA with\r\n usersa.sel.family = AF_UNSPEC\r\n usersa.sel.prefixlen_s = 128\r\n usersa.family = AF_INET\r\n\r\nBecause of the AF_UNSPEC selector, verify_newsa_info doesn\u0027t put limits on prefixlen_{s,d}. But then copy_from_user_state sets x-\u003esel.family to usersa.family (AF_INET). Do the same conversion inverify_newsa_info before validating prefixlen_{s,d}, since that\u0027s howprefixlen is going to be used later on.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50142"
},
{
"cve": "CVE-2024-50148",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: bnep: fix wild-memory-access in proto_unregister\r\n\r\nAs bnep_init() ignore bnep_sock_init()\u0027s return value, and bnep_sock_init() will cleanup all resource. Then when remove bnep module will call bnep_sock_cleanup() to cleanup sock\u0027s resource.\r\nTo solve above issue just return bnep_sock_init()\u0027s return value in bnep_exit().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50148"
},
{
"cve": "CVE-2024-50150",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: typec: altmode should keep reference to parent\r\n\r\nThe altmode device release refers to its parent device, but without keeping\r\na reference to it.\r\n\r\nWhen registering the altmode, get a reference to the parent and put it in\r\nthe release function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50150"
},
{
"cve": "CVE-2024-50151",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsmb: client: fix OOBs when building SMB2_IOCTL request\r\n\r\nWhen using encryption, either enforced by the server or when using\r\n\u0027seal\u0027 mount option, the client will squash all compound request buffers\r\ndown for encryption into a single iov in smb2_set_next_command().\r\n\r\nSMB2_ioctl_init() allocates a small buffer (448 bytes) to hold the\r\nSMB2_IOCTL request in the first iov, and if the user passes an input\r\nbuffer that is greater than 328 bytes, smb2_set_next_command() will\r\nend up writing off the end of @rqst-\u003eiov[0].iov_base as shown below:\r\n\r\n mount.cifs //srv/share /mnt -o ...,seal\r\n ln -s $(perl -e \"print(\u0027a\u0027)for 1..1024\") /mnt/link\r\n\r\n BUG: KASAN: slab-out-of-bounds in\r\n smb2_set_next_command.cold+0x1d6/0x24c [cifs]\r\n Write of size 4116 at addr ffff8881148fcab8 by task ln/859",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50151"
},
{
"cve": "CVE-2024-50153",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: target: core: Fix null-ptr-deref in target_alloc_device()\r\n\r\nThere is a null-ptr-deref issue reported by KASAN:\r\n\r\nBUG: KASAN: null-ptr-deref in target_alloc_device+0xbc4/0xbe0 [target_core_mod]\r\n...\r\n kasan_report+0xb9/0xf0\r\n target_alloc_device+0xbc4/0xbe0 [target_core_mod]\r\n core_dev_setup_virtual_lun0+0xef/0x1f0 [target_core_mod]\r\n target_core_init_configfs+0x205/0x420 [target_core_mod]\r\n do_one_initcall+0xdd/0x4e0\r\n...\r\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\r\n\r\nIn target_alloc_device(), if allocing memory for dev queues fails, then\r\ndev will be freed by dev-\u003etransport-\u003efree_device(), but dev-\u003etransport\r\nis not initialized at that time, which will lead to a null pointer\r\nreference problem.\r\n\r\nFixing this bug by freeing dev with hba-\u003ebackend-\u003eops-\u003efree_device().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50153"
},
{
"cve": "CVE-2024-50188",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "net: phy: dp83869: fix memory corruption when enabling fiber. When configuring the fiber port, the DP83869 PHY driver incorrectly calls linkmode_set_bit() with a bit mask (1 \u0026lt;\u0026lt; 10) rather than a bit number (10). This corrupts some other memory location -- in case of arm64 the priv pointer in the same structure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50188"
},
{
"cve": "CVE-2024-50205",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()\r\n\r\nThe step variable is initialized to zero. It is changed in the loop,\r\nbut if it\u0027s not changed it will remain zero. Add a variable check\r\nbefore the division.\r\n\r\nThe observed behavior was introduced by commit 826b5de90c0b\r\n(\"ALSA: firewire-lib: fix insufficient PCM rule for period/buffer size\"),\r\nand it is difficult to show that any of the interval parameters will\r\nsatisfy the snd_interval_test() condition with data from the\r\namdtp_rate_table[] table.\r\n\r\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50205"
},
{
"cve": "CVE-2024-50210",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nposix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()\r\n\r\nIf get_clock_desc() succeeds, it calls fget() for the clockid\u0027s fd,\r\nand get the clk-\u003erwsem read lock, so the error path should release\r\nthe lock to make the lock balance and fput the clockid\u0027s fd to make\r\nthe refcount balance and release the fd related resource.\r\n\r\nHowever the below commit left the error path locked behind resulting in\r\nunbalanced locking. Check timespec64_valid_strict() before\r\nget_clock_desc() to fix it, because the \"ts\" is not changed\r\nafter that.\r\n\r\n[pabeni@redhat.com: fixed commit message typo]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50210"
},
{
"cve": "CVE-2024-50251",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() If access to offset + length is larger than the skbuff length, then skb_checksum() triggers BUG_ON(). skb_checksum() internally subtracts the length parameter while iterating over skbuff, BUG_ON(len) at the end of it checks that the expected length to be included in the checksum calculation is fully consumed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50251"
},
{
"cve": "CVE-2024-50262",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50262"
},
{
"cve": "CVE-2024-50299",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50299"
},
{
"cve": "CVE-2024-50301",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50301"
},
{
"cve": "CVE-2024-50302",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let\u0027s zero-initialize it during allocation to make sure that it can\u0027t be ever used to leak kernel memory via specially-crafted report.",
"title": "Summary"
},
{
"category": "summary",
"text": "The information disclosure is limited to HID driver report data. Successful exploitation requires the installation of malicious code on the device.",
"title": "For SIMATIC S7-1500 TM MFP - GNU/Linux subsystem"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50302"
},
{
"cve": "CVE-2024-53042",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()\r\n\r\nThere are code paths from which the function is called without holding\r\nthe RCU read lock, resulting in a suspicious RCU usage warning [1].\r\n\r\nFix by using l3mdev_master_upper_ifindex_by_index() which will acquire\r\nthe RCU read lock before calling\r\nl3mdev_master_upper_ifindex_by_index_rcu().\r\n\r\n[1]\r\nWARNING: suspicious RCU usage\r\n6.12.0-rc3-custom-gac8f72681cf2 #141 Not tainted\r\n-----------------------------\r\nnet/core/dev.c:876 RCU-list traversed in non-reader section!!\r\n\r\nother info that might help us debug this:\r\n\r\nrcu_scheduler_active = 2, debug_locks = 1\r\n1 lock held by ip/361:\r\n #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-53042"
},
{
"cve": "CVE-2024-53057",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-53057"
},
{
"cve": "CVE-2024-53059",
"cwe": {
"id": "CWE-460",
"name": "Improper Cleanup on Thrown Exception"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()\r\n\r\n1. The size of the response packet is not validated.\r\n2. The response buffer is not freed.\r\n\r\nResolve these issues by switching to iwl_mvm_send_cmd_status(), which handles both size validation and frees the buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-53059"
},
{
"cve": "CVE-2024-53101",
"cwe": {
"id": "CWE-456",
"name": "Missing Initialization of a Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized value issue in from_kuid and from_kgid ocfs2_setattr() uses attr-\u003eia_mode, attr-\u003eia_uid and attr-\u003eia_gid in a trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren\u0027t set. Initialize all fields of newattrs to avoid uninitialized variables, by checking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-53101"
},
{
"cve": "CVE-2024-53124",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "net: fix data-races around sk sk_forward_alloc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-53124"
},
{
"cve": "CVE-2024-56631",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\nscsi: sg: Fix slab-use-after-free read in sg_release()\r\nFix a use-after-free bug in sg_release(), detected by syzbot with KASAN:\r\n\r\nThe fix has been tested and validated by syzbot. This patch closes the\r\nbug reported at the following syzkaller link and ensures proper\r\nsequencing of resource cleanup and mutex operations, eliminating the\r\nrisk of use-after-free errors in sg_release().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-56631"
},
{
"cve": "CVE-2024-56672",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix UAF in blkcg_unpin_online()\r\n\r\nblkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To\r\nwalk up, it uses blkcg_parent(blkcg) but it was calling that after\r\nblkcg_destroy_blkgs(blkcg) which could free the blkcg",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-56672"
},
{
"cve": "CVE-2024-57901",
"cwe": {
"id": "CWE-664",
"name": "Improper Control of a Resource Through its Lifetime"
},
"notes": [
{
"category": "summary",
"text": "af_packet: vlan_get_protocol_dgram() vs MSG_PEEK Blamed allowing a crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57901"
},
{
"cve": "CVE-2024-57902",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\naf_packet: fix vlan_get_tci() vs MSG_PEEK\r\n\r\nBlamed commit forgot MSG_PEEK case, allowing a crash [1] as found\r\nby syzbot.\r\n\r\nRework vlan_get_tci() to not touch skb at all,\r\nso that it can be used from many cpus on the same skb.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57902"
},
{
"cve": "CVE-2024-57913",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: f_fs: Remove WARN_ON in functionfs_bind",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57913"
},
{
"cve": "CVE-2024-57929",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndm array: fix releasing a faulty array block twice in dm_array_cursor_end\r\n\r\nWhen dm_bm_read_lock() fails due to locking or checksum errors, it\r\nreleases the faulty block implicitly while leaving an invalid output\r\npointer behind. The caller of dm_bm_read_lock() should not operate on\r\nthis invalid dm_block pointer, or it will lead to undefined result.\r\nFor example, the dm_array_cursor incorrectly caches the invalid pointer\r\non reading a faulty array block, causing a double release in\r\ndm_array_cursor_end(), then hitting the BUG_ON in dm-bufio cache_put().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57929"
},
{
"cve": "CVE-2024-57940",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "exfat: fix the infinite loop in exfat_readdir() If the file system is corrupted so that a cluster is linked to itself in the cluster chain, and there is an unused directory entry in the cluster, dentry will not be incremented, causing condition dentry \u003c max_dentries unable to prevent an infinite loop. This infinite loop causes s_lock not to be released, and other tasks will hang, such as exfat_sync_fs().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57940"
},
{
"cve": "CVE-2024-57948",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmac802154: check local interfaces before deleting sdata list\r\n\r\nsyzkaller reported a corrupted list in ieee802154_if_remove. [1]\r\n\r\nRemove an IEEE 802.15.4 network interface after unregister an IEEE 802.15.4\r\nhardware device from the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57948"
},
{
"cve": "CVE-2024-57951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhrtimers: Handle CPU state correctly on hotplug\r\n\r\nConsider a scenario where a CPU transitions from CPUHP_ONLINE to halfway\r\nthrough a CPU hotunplug down to CPUHP_HRTIMERS_PREPARE, and then back to\r\nCPUHP_ONLINE:\r\n\r\nSince hrtimers_prepare_cpu() does not run, cpu_base.hres_active remains set\r\nto 1 throughout. However, during a CPU unplug operation, the tick and the\r\nclockevents are shut down at CPUHP_AP_TICK_DYING. On return to the online\r\nstate, for instance CFS incorrectly assumes that the hrtick is already\r\nactive, and the chance of the clockevent device to transition to oneshot\r\nmode is also lost forever for the CPU, unless it goes back to a lower state\r\nthan CPUHP_HRTIMERS_PREPARE once.\r\n\r\nThis round-trip reveals another issue; cpu_base.online is not set to 1\r\nafter the transition, which appears as a WARN_ON_ONCE in enqueue_hrtimer().\r\n\r\nAside of that, the bulk of the per CPU state is not reset either, which\r\nmeans there are dangling pointers in the worst case.\r\n\r\nAddress this by adding a corresponding startup() callback, which resets the\r\nstale per CPU state and sets the online flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57951"
},
{
"cve": "CVE-2024-57977",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "memcg: A soft lockup vulnerability in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup was triggered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57977"
},
{
"cve": "CVE-2024-57979",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "pps: Fix a use-after-free",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57979"
},
{
"cve": "CVE-2024-57981",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "usb: xhci: NULL pointer dereference on certain command aborts. If a command is queued to the final usable TRB of a ring segment, the enqueue pointer is advanced to the subsequent link TRB and no further. If the command is later aborted, when the abort completion is handled the dequeue pointer is advanced to the first TRB of the next segment. If no further commands are queued, xhci_handle_stopped_cmd_ring() sees the ring pointers unequal and assumes that there is a pending command, so it calls xhci_mod_cmd_timer() which crashes if cur_cmd was NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57981"
},
{
"cve": "CVE-2024-57986",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57986"
},
{
"cve": "CVE-2024-58005",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tpm: Change to kvalloc() in eventlog/acpi.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58005"
},
{
"cve": "CVE-2024-58009",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58009"
},
{
"cve": "CVE-2024-58014",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58014"
},
{
"cve": "CVE-2024-58016",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "safesetid: check size of policy writes",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58016"
},
{
"cve": "CVE-2024-58017",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58017"
},
{
"cve": "CVE-2024-58020",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "HID: multitouch: Add NULL check in mt_input_configured",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58020"
},
{
"cve": "CVE-2024-58051",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipmi: ipmb: Add check devm_kasprintf() returned value",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58051"
},
{
"cve": "CVE-2024-58058",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ubifs: skip dumping tnc tree when zroot is null",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58058"
},
{
"cve": "CVE-2024-58063",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "wifi: rtlwifi: fix memory leaks and invalid access at probe error path",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58063"
},
{
"cve": "CVE-2024-58071",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "team: prevent adding a device which is already a team device lower",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58071"
},
{
"cve": "CVE-2024-58072",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wifi: rtlwifi: remove unused check_buddy_priv",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58072"
},
{
"cve": "CVE-2024-58085",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tomoyo: don\u0027t emit warning in tomoyo_write_control()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58085"
},
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-9230"
},
{
"cve": "CVE-2025-21638",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: sysctl: auth_enable: avoid using current-\u003ensproxy\n\nAs mentioned in a previous commit of this series, using the \u0027net\u0027\nstructure via \u0027current\u0027 is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader\u0027s/writer\u0027s netns vs only\n from the opener\u0027s netns.\n\n- current-\u003ensproxy can be NULL in some cases, resulting in an \u0027Oops\u0027\n (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n syzbot [1] using acct(2).\n\nThe \u0027net\u0027 structure can be obtained from the table-\u003edata using\ncontainer_of().\n\nNote that table-\u003edata could also be used directly, but that would\nincrease the size of this fix, while \u0027sctp.ctl_sock\u0027 still needs to be\nretrieved from \u0027net\u0027 structure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21638"
},
{
"cve": "CVE-2025-21639",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: sysctl: rto_min/max: avoid using current-\u003ensproxy\n\nAs mentioned in a previous commit of this series, using the \u0027net\u0027\nstructure via \u0027current\u0027 is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader\u0027s/writer\u0027s netns vs only\n from the opener\u0027s netns.\n\n- current-\u003ensproxy can be NULL in some cases, resulting in an \u0027Oops\u0027\n (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n syzbot [1] using acct(2).\n\nThe \u0027net\u0027 structure can be obtained from the table-\u003edata using\ncontainer_of().\n\nNote that table-\u003edata could also be used directly, as this is the only\nmember needed from the \u0027net\u0027 structure, but that would increase the size\nof this fix, to use \u0027*data\u0027 everywhere \u0027net-\u003esctp.rto_min/max\u0027 is used.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21639"
},
{
"cve": "CVE-2025-21640",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: sysctl: cookie_hmac_alg: avoid using current-\u003ensproxy\n\nAs mentioned in a previous commit of this series, using the \u0027net\u0027\nstructure via \u0027current\u0027 is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader\u0027s/writer\u0027s netns vs only\n from the opener\u0027s netns.\n\n- current-\u003ensproxy can be NULL in some cases, resulting in an \u0027Oops\u0027\n (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n syzbot [1] using acct(2).\n\nThe \u0027net\u0027 structure can be obtained from the table-\u003edata using\ncontainer_of().\n\nNote that table-\u003edata could also be used directly, as this is the only\nmember needed from the \u0027net\u0027 structure, but that would increase the size\nof this fix, to use \u0027*data\u0027 everywhere \u0027net-\u003esctp.sctp_hmac_alg\u0027 is\nused.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21640"
},
{
"cve": "CVE-2025-21647",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\nsched: sch_cake: add bounds checks to host bulk flow fairness counts",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21647"
},
{
"cve": "CVE-2025-21648",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: conntrack: clamp maximum hashtable size to INT_MAX\r\n\r\nUse INT_MAX as maximum size for the conntrack hashtable. Otherwise, it\r\nis possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when\r\nresizing hashtable because __GFP_NOWARN is unset. See:\r\n\r\n 0708a0afe291 (\"mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls\")\r\n\r\nNote: hashtable resize is only possible from init_netns.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21648"
},
{
"cve": "CVE-2025-21653",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21653"
},
{
"cve": "CVE-2025-21664",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "dm thin: make get_first_thin use rcu-safe list first function",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21664"
},
{
"cve": "CVE-2025-21666",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "vsock: prevent null-ptr-deref in vsock_has_data|has_space",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21666"
},
{
"cve": "CVE-2025-21669",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "vsock/virtio: discard packets if the transport changes",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21669"
},
{
"cve": "CVE-2025-21678",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "gtp: Destroy device along with udp socket\u0027s netns dismantle",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21678"
},
{
"cve": "CVE-2025-21683",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "bpf: Fix bpf_sk_select_reuseport() memory leak",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21683"
},
{
"cve": "CVE-2025-21692",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "net: sched: fix ets qdisc OOB Indexing",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21692"
},
{
"cve": "CVE-2025-21694",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "fs/proc: softlockup in __read_vmcore",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21694"
},
{
"cve": "CVE-2025-21704",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: cdc-acm: Check control transfer buffer size before access",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21704"
},
{
"cve": "CVE-2025-21711",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "net/rose: prevent integer overflows in rose_setsockopt()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21711"
},
{
"cve": "CVE-2025-21719",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipmr: do not call mr_mfc_uses_dev() for unres entries",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21719"
},
{
"cve": "CVE-2025-21726",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "padata: avoid UAF for reorder_work",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21726"
},
{
"cve": "CVE-2025-21727",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "padata: fix UAF in padata_reorder",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21727"
},
{
"cve": "CVE-2025-21728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21728"
},
{
"cve": "CVE-2025-21735",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "NFC: nci: Add bounds checking in nci_hci_create_pipe()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21735"
},
{
"cve": "CVE-2025-21744",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21744"
},
{
"cve": "CVE-2025-21745",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix class @block_class\u0027s subsystem refcount leakage\r\n\r\nblkcg_fill_root_iostats() iterates over @block_class\u0027s devices by\r\nclass_dev_iter_(init|next)(), but does not end iterating with\r\nclass_dev_iter_exit(), so causes the class\u0027s subsystem refcount leakage.\r\n\r\nFix by ending the iterating with class_dev_iter_exit().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21745"
},
{
"cve": "CVE-2025-21753",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "btrfs: fix use-after-free when attempting to join an aborted transaction",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21753"
},
{
"cve": "CVE-2025-21756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21756"
},
{
"cve": "CVE-2025-21760",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ndisc: extend RCU protection in ndisc_send_skb()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21760"
},
{
"cve": "CVE-2025-21761",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "openvswitch: use RCU protection in ovs_vport_cmd_fill_info()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21761"
},
{
"cve": "CVE-2025-21762",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21762"
},
{
"cve": "CVE-2025-21763",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "neighbour: use RCU protection in __neigh_notify()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21763"
},
{
"cve": "CVE-2025-21764",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ndisc: use RCU protection in ndisc_alloc_skb()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21764"
},
{
"cve": "CVE-2025-21765",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21765"
},
{
"cve": "CVE-2025-21772",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "partitions: mac: fix handling of bogus partition table",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-21776",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "USB: hub: Ignore non-compliant devices with too many configs or interfaces. A test program can cause usb_hub_to_struct_hub() to dereference a NULL or inappropriate pointer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21776"
},
{
"cve": "CVE-2025-21787",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "team: better TEAM_OPTION_TYPE_STRING validation",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21787"
},
{
"cve": "CVE-2025-21795",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NFSD: hang in nfsd4_shutdown_callback. If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21795"
},
{
"cve": "CVE-2025-21796",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfsd: clear acl_access/acl_default after releasing them If getting acl_default fails, acl_access and acl_default will be released simultaneously.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21796"
},
{
"cve": "CVE-2025-21806",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: let net.core.dev_weight always be non-zero. The following problem was encountered during stability test: (NULL net_device).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21806"
},
{
"cve": "CVE-2025-21814",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ptp: Ensure info-\u003eenable callback is always set",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21814"
},
{
"cve": "CVE-2025-21826",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: nf_tables: reject mismatching sum of field_len with set key length. The field length description provides the length of each separated key field in the concatenation, each field gets rounded up to 32-bits to calculate the pipapo rule width from pipapo_init(). The set key length provides the total size of the key aligned to 32-bits. Register-based arithmetics still allows for combining mismatching set key length and field length description, eg. set key length 10 and field description [ 5, 4 ] leading to pipapo width of 12.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21826"
},
{
"cve": "CVE-2025-21835",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: gadget: f_midi: fix MIDI Streaming descriptor lengths",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21835"
},
{
"cve": "CVE-2025-21844",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "smb: client: Add check for next_buffer in receive_encrypted_standard()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21844"
},
{
"cve": "CVE-2025-21846",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "acct: perform last write from workqueue",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21846"
},
{
"cve": "CVE-2025-21858",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "geneve: Fix use-after-free in geneve_find_dev()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21858"
},
{
"cve": "CVE-2025-21859",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "USB: gadget: f_midi: f_midi_complete to call queue_work",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21859"
},
{
"cve": "CVE-2025-21862",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "drop_monitor: incorrect initialization order. If drop_monitor is built as a kernel module, syzkaller may have time to send a netlink NET_DM_CMD_START message during the module loading. This will call the net_dm_monitor_start() function that uses a spinlock that has not yet been initialized.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21862"
},
{
"cve": "CVE-2025-21865",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Commit eb28fd76c0a0 (\"gtp: Destroy device along with udp socket\u0027s netns dismantle.\") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl() to destroy devices in each netns as done in geneve and ip tunnels. However, this could trigger -\u003edellink() twice for the same device during -\u003eexit_batch_rtnl().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-21865"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.